Preferred Language
Articles
/
jcoeduw-784
Impact of Computer on Human Health
...Show More Authors

As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the computer screen can lead to eye discomfort, fatigue, blurred vision and headaches,
dry eyes and other symptoms of eyestrain. These symptoms may be caused by poor lighting,
glare, an improper work station set-up, vision problems of which the person was not previously
aware, or a combination of these factors. Children can experience many of the same symptoms
related to computer use as adults. However, some unique aspects of how children use computers
may make them more susceptible than adults to the development of these problems.
In this research we took the adult and children as a case study, questioner are made to rich this
research and finally some preventions are listed to immune from the impact of computer..

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 20 2016
Journal Name
Al-academy
The Impact of using the strategy of shape (V) on the Achievement of the students of the Department of Artistic Education: كريم حواس علي، نجلاء خضير حسان
...Show More Authors

This research aim at finding out the impact of using the strategy of shape V on the achievement of the students of the Department of Artistic Education in the subject of "Principles of scientific Research ". This strategy is one of the cognitive strategies used in this topic . To verify the aim of the research ,the two researchers have put the following null hypothesis:-There are no significant differences on the level of 0,05 among the average degrees of the students of the experimental group in their answers on the topics of the pre and post cognitive achievement tests of the subject of "principles of scientific Research " . The two researchers have adopted the experimental approach which consists of one group . the population of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Influence of Aging Heat Treatment on Pitting Corrosion Resistance of Martensitic Stainless Steel
...Show More Authors

In this research is to study the influence of the aging heat treatment on the pitting corrosion resistance of martensitic stainless steel (MSS), where a number of specimens from martensitic stainless steel were subjected to solution treatment at 1100 oC for one hour followed by water quenching then aging in the temperatures range (500-750) oC for different holding times (1,5,10,15&20) hr. Accelerated chemical corrosion test and immersion chemical corrosion test were performed on samples after heat treatment. The results of the research showed that the pitting corrosion resistance is significantly affected by the aging temperature. Where found that the aging samples at a temperature of 500 °C have the highest ra

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 12 2006
Journal Name
Iraqi Journal Of Laser
Effect of Preheating on the Parameters of Laser Keyhole Welding Process: Analytical Study
...Show More Authors

In this work, results of a mathematical analysis of the role of workpiece preheating in laser keyhole welding were presented. This analysis considered the steady-state welding as well as certain range of boundary conditions over which preheating effect would be indicated. This work is an attempt to interpret the role of preheating to increase welding depth and perform keyhole welding with high quality using physical and thermal properties of steel alloys.

View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of Nonlinear PID Neural Controller for the Speed Control of a Permanent Magnet DC Motor Model based on Optimization Algorithm
...Show More Authors

In this paper, the speed control of the real DC motor is experimentally investigated using nonlinear PID neural network controller. As a simple and fast tuning algorithm, two optimization techniques are used; trial and error method and particle swarm optimization PSO algorithm in order to tune the nonlinear PID neural controller's parameters and to find best speed response of the DC motor. To save time in the real system, a Matlab simulation package is used to carry out these algorithms to tune and find the best values of the nonlinear PID parameters. Then these parameters are used in the designed real time nonlinear PID controller system based on LabVIEW package. Simulation and experimental results are compared with each other and showe

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Memorizing the Holy Quran and its Impact on Child's Language: سالم بن غرم الله بن محمد الزهراني/ جامعة ام القرى - السعودية
...Show More Authors

في هذا العصر - الذي داهمت في الأخطار لغة الفصاحة والبيان - يبقى القرآن الكريم أعظم حافظ للغة السليمة ، وأكبر معين لأهلها للحفاظ على ثرائها وبلاغتها ، فهي باقية ببقائه ما بقي الليل والنهار .

وهذا البحث يدور حول حفظ القرآن الكريم وأثره على لغة الطفل، ويتكون من مقدمة : وفيها بيان أهمية الموضوع ، وخطة البحث ، ومنهجه، وثلاثة مباحث:

المبحث الأول : فضل حفظ القرآن الكريم ، وفوائد حفظه إجمالاً ، والمبحث الثاني :

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Personality Types in Relation to the Periodontal Health Status and Salivary Dehydroepiandrosterone among Teachers in Baghdad City
...Show More Authors

Background: The individual differences in emotional and behavioral style can be examined through personality instruments. These differences may explain the health status of the individuals. The purpose of the present study was to assess the influence of Personality Types on gingival and periodontal health status among teachers in Baghdad city in relation to selected salivary hormone (Dehydroepiandrosterone). Materials and methods: Females teachers 534 of randomly selected schools were subjected to personality questionnaire using The Riso-Hudson Enneagram Type Indicator. Teachers were examined to estimate the periodontal status according to the Community Periodontal Index (CPI). A group of teachers were selected for salivary analysis of Dehy

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Oral health status in relation to nutritional status among institutionalized and non-institutionalized orphans in Baghdad city
...Show More Authors

Background: Nutritional condition was reported as one of the factors affecting the oral health status, particularly among underprivileged groups. Orphans are one of the known high-risk groups. The aims of this study were to assess the nutritional status of orphans, and its impact on the oral health status. Materials and Methods: Five-hundred children aged 6-12 years old, 254 males and 246 females: institutionalized, non-institutionalized orphans and controls were participated in this study. Nutritional status assessed according to body mass index (BMI). Ramfjord index teeth were examined to assess oral cleanliness and gingival condition. All data were analyzed using SPSS version 23. Results this study revealed the institutionalized orphans

... Show More
View Publication Preview PDF
Crossref