As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the computer screen can lead to eye discomfort, fatigue, blurred vision and headaches,
dry eyes and other symptoms of eyestrain. These symptoms may be caused by poor lighting,
glare, an improper work station set-up, vision problems of which the person was not previously
aware, or a combination of these factors. Children can experience many of the same symptoms
related to computer use as adults. However, some unique aspects of how children use computers
may make them more susceptible than adults to the development of these problems.
In this research we took the adult and children as a case study, questioner are made to rich this
research and finally some preventions are listed to immune from the impact of computer..
Background: In human life, malnutrition may adversely affect various aspects of growth at different stages of life. Teeth are particularly sensitive to malnutrition. Malnutrition may affect odontometeric measurement involving arch width and length of primary dentition. The aim of this study is to estimate the effect of nutrition on arch width and length dimension measurements among children aged 5 years old. Material and methods: This study was conducted among malnourished group in comparison to well-nourished group matching with age and gender. The present study included 158 children aged 5 years (78 malnourished and 80 well-nourished). The assessment of nutritional status was done by using three nutritional indicators, namely Height-for-a
... Show MoreIn this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show MoreRooting response in stem cuttings of mung bean increased considerably with inresing
seedling age, due to endogenous IAA or supplied IBA. However, after the day 7- or 8-old of
seedling age. The cotyledons sheivel and drop-off spontaneously at day-8 of seedling age. So
that cotyledons excision after cuttings were made during the period between seedling
emergence (the day 4) and cotyledons dropping off (which starts at day 8 and its completion
at day 10) causes decrease in rooting at any time during cutting treatment ,in particular, at
zero time . In addition, results of this study revealed that terminal buds do not influence
significantly adventitious root formation whether IBA supplied or not. Whereas in leafless
c
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Teaching through the system of personal learning, known as (Clare's plan) is amongst the most prominent plans which depend on self-education, as it received worldwide recognition. The plan lets the learner achieve learning by depending on himself after being familiar with the educational goals given to him, then he starts to solve the exercises and the drills accompanying the unit. After that, he checks his achievement by answering the self-evaluation tests. This method offers more opportunities for personal interaction than do the traditional systems, and individual leaning is a methodical expression aims at taking care of the learner and making him the locus of the processes of teaching and learning.
Aims of the study
... Show More