As computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the computer screen can lead to eye discomfort, fatigue, blurred vision and headaches,
dry eyes and other symptoms of eyestrain. These symptoms may be caused by poor lighting,
glare, an improper work station set-up, vision problems of which the person was not previously
aware, or a combination of these factors. Children can experience many of the same symptoms
related to computer use as adults. However, some unique aspects of how children use computers
may make them more susceptible than adults to the development of these problems.
In this research we took the adult and children as a case study, questioner are made to rich this
research and finally some preventions are listed to immune from the impact of computer..
The problem of the research is that some companies lack the mechanisms and policies that to enhance the loyalty of these valuable resources, which led to difficulties in generating knowledge, producing, storing, investing and investing information to achieve a sustainable competitive advantage. In addition, companies are still working with the traditional wage system (monthly salaries), which makes people not think about adding value to work. The research aims to determine the level of variables for researchers to clarify the impact of the organizational innovation climate on sustainable competitive advantage. The Qualitative approach is used based on research. The research was applied
... Show MoreWater provision is sensitive to climate change, and agricultural production and food supply are sensitive to water availability. Water scarcity affects food security and agricultural economic development through changes in agricultural production and changes in the composition of produced goods. Recent droughts also led to a decrease in the volume of water allocated to agriculture, which led to a decrease in total agricultural production and exports, and this has subsequent impacts on food security and economic development. The research aimed to measure the impact of water scarcity on agricultural economic development for the period 1990-2022. The research included three behavioral equations with three endogenous variables: the cult
... Show More|
مجلة العلوم الاقتصادية والإدارية المجلد 18 العدد 69 الصفحات 318- 332 |
There is a need to make serious efforts For Iraqi universities to be in the ranks of advanced universities in the world. This requires attracting teaching talents and providing an incubating environment for them. Therefore, the objective of the research was to explore the influence of (the environment, the development of talents) on sustainable competitive advantages. The research followed the descriptive approach and used the quantitative analysis method. Almaqaal university is the field of study. The study sample size (of 76 people), from almaaqal university teachers, and the sample comprised the available staff specialized in the field of Teaching and research. The questionnaire was utilised as a data collection tool and (spss) program w
... Show MoreReliable estimation of critical parameters such as hydrocarbon pore volume, water saturation, and recovery factor are essential for accurate reserve assessment. The inherent uncertainties associated with these parameters encompass a reasonable range of estimated recoverable volumes for single accumulations or projects. Incorporating this uncertainty range allows for a comprehensive understanding of potential outcomes and associated risks. In this study, we focus on the oil field located in the northern part of Iraq and employ a Monte Carlo based petrophysical uncertainty modeling approach. This method systematically considers various sources of error and utilizes effective interpretation techniques. Leveraging the current state of a
... Show MoreSuccessive waves and generations of terrorists attacked the Iraqis in the years following the fall of the regime in Iraq in 2003, after the US invasion of the country under the pretext of weapons of mass destruction. Hence, the Iraqi people enrolled in ongoing war with these armed groups which led to massive casualties due to blasts and missile injuries.
Mechanism of blasts injury can be classified into primary, secondary, tertiary, and quaternary. While bullet injuries can be classified into low and high-energy injuries, the type and severity of the injury will influence the type of management, together with facilities available in
Coronavirus: (COVID-19) is a recently discovered viral disease caused by a new strain of coronavirus.
The majority of patients with corona-virus infections will have a mild-moderate respiratory disease that recovers without special care. Most often, the elderly, and others with chronic medical conditions such as asthma, coronary disease, respiratory illness, and malignancy are seriously ill.
COVID-19 is spread mostly by salivary droplets or nasal secretions when an infected person coughs or sneezes.
COVID-19 causes severe acute respiratory illness (SARS-COV-2). The first incidence was recorded in Wuhan, China, in 2019. Since then it spreads leading to a pandemic.
... Show MoreThis study investigates the influence of Strategic Consensus (SC) on Organizational Performance (OP), with Strategic Alignment (SA) serving as a mediating variable, within private academic institutions in Iraq. The research utilized scales developed to measure each variable: SC, OP, and SA, all of which are unidimensional. The sample comprised 131 senior participants, including deans and faculty council members, with questionnaires distributed across three institutions: Dijla University College (35 respondents), Baghdad College of Economic Sciences (31 respondents), and the University of Uruk (65 respondents). Data analysis employed various statistical techniques, including normality testing, confirmatory factor analysis, descriptive statis
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More