Background: Autism is a complex developmental disability that typically appears during the first three years of life. Autism affects the normal development of the brain in the areas of social interaction and communication skills.Objectives: To identify risk factors for Autism among a sample of autistic children in Baghdad city. Type of the study: this is a case – control, study. Methods: This study was conducted during the period of data collection extended from first of November 2010 until the first of April 2011,The total number of children involved was 100children with diagnosis of autism. Handred children who are free from autism were taken as the control sample. Results: there was a significant association between paternal age and the risk for autism, fathers older than 40 years had 11 times increased risk of having an offspring with autism, (p=0.043).Psychologicalproblems, showed a statistically increased risk of autism associated with maternal history of (maternal unhappy emotional state), the odds ratio of this risk factor was seven (p=0.01). Post term (14% in cases vs. 2% in controls) (P=0.005, OR 8.80) and neonatal jaundice (30% in cases and 11% in controls) (P=0.001, OR 3.71) were significantly associated with autism.Bottle-feeding showed the highest significant associations with risk of autism (p=0.004, OR=2.84).Conclusion:Autism has many associated risk factorslikepaternalage (fathers older than 40 years),psychological problems (maternal unhappy emotional state),post term,neonataljaundiceandbottle-feeding
For many problems in Physics and Computational Fluid Dynamics (CFD), providing an accurate approximation of derivatives is a challenging task. This paper presents a class of high order numerical schemes for approximating the first derivative. These approximations are derived based on solving a special system of equations with some unknown coefficients. The construction method provides numerous types of schemes with different orders of accuracy. The accuracy of each scheme is analyzed by using Fourier analysis, which illustrates the dispersion and dissipation of the scheme. The polynomial technique is used to verify the order of accuracy of the proposed schemes by obtaining the error terms. Dispersion and dissipation errors are calculated
... Show MoreThe physical and morphological characteristics of porous silicon (PS) synthesized via gas sensor was assessed by electrochemical etching for a Si wafer in diluted HF acid in water (1:4) at different etching times and different currents. The morphology for PS wafers by AFM show that the average pore diameter varies from 48.63 to 72.54 nm with increasing etching time from 5 to 15min and from 72.54 to 51.37nm with increasing current from 10 to 30 mA. From the study, it was found that the gas sensitivity of In2O3: CdO semiconductor, against NO2 gas, directly correlated to the nanoparticles size, and its sensitivity increases with increasing operating temperature.
New complexes have been prepared from the new ligand [2,2′‐(5,5‐dimethylcyclohexane‐1,3‐diylidene)bis(azan‐1‐yl‐1‐ylidene)dibenzoic acid] derived from 5,5‐dimethylcyclohexane‐1,3‐dione and 2‐aminobenzoic acid. Accordingly, its mono and binuclear Mn(II), Co(II), Cu(II), Zn(II), and Cd(II) complexes were prepared. The prepared components have been characterized by various spectroscopic techniques and elemental analysis. The thermal stability of the ligand and its complexes were performed by TGA. It was found that all the complexes have excellent thermal stability and do not contain water molecules within their structure, but the ligand has little stability. Additionally, theor
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreSelf-driving automobiles are prominent in science and technology, which affect social and economic development. Deep learning (DL) is the most common area of study in artificial intelligence (AI). In recent years, deep learning-based solutions have been presented in the field of self-driving cars and have achieved outstanding results. Different studies investigated a variety of significant technologies for autonomous vehicles, including car navigation systems, path planning, environmental perception, as well as car control. End-to-end learning control directly converts sensory data into control commands in autonomous driving. This research aims to identify the most accurate pre-trained Deep Neural Network (DNN) for predicting the steerin
... Show MoreThe application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the
... Show More