Preferred Language
Articles
/
jkmc-351
Risk factors for autism in Baghdad city
...Show More Authors

Background: Autism is a complex developmental disability that typically appears during the first three years of life. Autism affects the normal development of the brain in the areas of social interaction and communication skills.Objectives: To identify risk factors for Autism among a sample of autistic children in Baghdad city. Type of the study: this is a case – control, study. Methods: This study was conducted during the period of data collection extended from first of November 2010 until the first of April 2011,The total number of children involved was 100children with diagnosis of autism. Handred children who are free from autism were taken as the control sample. Results: there was a significant association between paternal age and the risk for autism, fathers older than 40 years had 11 times increased risk of having an offspring with autism, (p=0.043).Psychologicalproblems, showed a statistically increased risk of autism associated with maternal history of (maternal unhappy emotional state), the odds ratio of this risk factor was seven (p=0.01). Post term (14% in cases vs. 2% in controls) (P=0.005, OR 8.80) and neonatal jaundice (30% in cases and 11% in controls) (P=0.001, OR 3.71) were significantly associated with autism.Bottle-feeding showed the highest significant associations with risk of autism (p=0.004, OR=2.84).Conclusion:Autism has many associated risk factorslikepaternalage (fathers older than 40 years),psychological problems (maternal unhappy emotional state),post term,neonataljaundiceandbottle-feeding

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks
...Show More Authors

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Thu Feb 11 2021
Journal Name
Journal Of Legal Sciences
The Consequences of Discovering Pharmaceutical Products for the Researcher
...Show More Authors

The process of discovering pharmaceuticals is of great importance in our contemporary life, in a way that without life becomes almost impossible, as this process is the first building block in the field of pharmaceutical industries to search for new methods and means of treatment and treatment. But in fact, the fact that talking about this process is not that simple and easy, because this process is complicated and difficult in a way that makes it take a time range that in some cases reaches what is permissible ten years to reach a chemical formula that can be used later in the manufacturing process Pharmacokinetics, and during this long period of time, this process will have a set of effects, some of which are specific to the researcher di

... Show More
View Publication
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Generation of Weak Coherent Pulses for Quantum Cryptography Systems
...Show More Authors

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Publication Date
Sat May 19 2012
Journal Name
Wireless Personal Communications
Stable-Aware Evolutionary Routing Protocol for Wireless Sensor Networks
...Show More Authors

Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Performance application of ultraviolet disinfection technique for raw water
...Show More Authors
Abstract<p>Microbial water disinfection with UV rays is a universal technology. Disinfection is a method used to treat drinking water. This can be accomplished using physical and/or chemical processes. Physical Methods: Heating and UV rays are two main methods - UV rays to destroy cells and kill bacteria. The physical process generally gives drinking water an instant purification without producing harmful substances. However, there is no pollution in the water to ensure continuous cleaning. This study’s primary goal is to obtain environmentally safe drinking water in situations of water shortages and homes that lack clean water. Therefore, resort to appropriate home treatment. Therefore, an ex</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Feb 06 2026
Journal Name
International Journal Of Law And Society
Mechanisms for Achieving a Green Economy and Practical Challenges
...Show More Authors

In light of accelerating environmental degradation, the transition to a green economy is an imperative for achieving sustainable development. This study provides a critical analysis of the international legal and institutional framework governing this transition, revealing a significant gap between normative developments and the institutional framework on one hand, and their practical implementation on the other. The transition faces legal obstacles, including reliance on non-binding voluntary commitments and conflicts between environmental obligations and global trade and investment rules. It also reveals a significant financing gap, as financial flows to developing countries continue to lag behind commitments, in add

... Show More
View Publication Preview PDF
Crossref