|
Background: During the pandemic, Corona virus forced many people, especially students, to spend more time than before on the computer and smartphone to study and communicate. The poor posture of the body may have worse effect on its body parts , most of which is the cervical spine (forward head posture). Objective: To assess the incidence of neck pain and the associated factors among undergraduate medical students related to position during E learning Subjects and Methods: Cross-sectional study was conducted among medical students in three Iraqi universities during 2021. The sample size was 152. Online questionnaire by Google forms sampling method were used to collect the data which was analysed using SPSS 25. Results: The percentage of students who suffered cervical pain was (80.3%) of the 152 who participated in this study and the majority of those who suffered pain were complained from increase pain during the pandemic (72.1%). This study also showed the students recumbent on the floor 67 (44.1%) more than those who use the table and chair 62 (40.8%) during E-learning. The percentage of students who use the phone for more than 4 hours were (73.7%). |
The interior spaces represent a true reflection of the concepts and values of humanity and requirements; were interested in current research ongoing changes that have occurred in those human values and requirements over time, even pat each time warp its values and its own requirements. Those changes, which receive Bdilalha the spaces linked by a renewal which guarantees the interior design of the spaces of sustainability and bio-coordinated. Launched search from an initial perception that those associated with the changes of the spaces through time that have not been subject to examination and supervision, they will constitute a continuing threat of losing the ties with the past under the pretext of modernization and mo
... Show MoreThe formal integration of the interior spaces in general and the commercial spaces of the watch shops in the large commercial centers in particular is the goal that the designers aim to reach in order for the interior space to become successful in terms of the design idea and its characteristics. Implementation mechanism. One of the reasons for achieving formal integration in the interior spaces of watch shops is the requirements of the design that must be available in these spaces to reach a state of formal integration between the interior and the exterior so that the space becomes fully integrated in all respects. Because of the aforementioned reasons for dealing with the research, through four chapters: The first chapter included the
... Show MoreThis research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force f
... Show MoreThe current research aims to prepare a proposed Programmebased sensory integration theory for remediating some developmental learning disabilities among children, researchers prepared a Programme based on sensory integration through reviewing studies related to the research topic that can be practicedby some active teaching strategies (cooperative learning, peer learning, Role-playing, and educational stories). The Finalformat consists of(39) training sessions.
Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreBackground: One of the major problems in endodontics is micro-leakage of root canal fillings which might contribute to the failure of endodontic treatment. To avoid this problem, a variety of sealers have been tested. The objective of this, in vitro, study was to evaluate the shear bond strength of four resin based sealers (AH plus, silver free AH26, RealSeal SE and Perma Evolution permanent root canal filling material) to dentin. Materials and Methods: Forty non-carious extracted lower premolars were used. The 2mm of the occlusal surfaces of teeth were sectioned, to expose the dentin surface. The exposed dentin surfaces of teeth were washed with 5ml of 2.5% NaOCl solution followed by 5ml of 17 % EDTA then rinsed by deionized water to remov
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreMost of the big companies and especially the intillictual ones become a ware of an important fact, and That is, The intillictual capital in new global economy, is a new source for Them & This Valuable source exceed in importance. The other company's sources.
The Traditional disclouser systemes are unable to supply the decisions makers with the Fundimental information require to handel the on going operations which are based on Knowledge and intangible source. But the measuring of this source and the disclose for it in the financial Statements will lead to gain features Statements which will benefit all the parties and lead to make the value of the company great.
And as a resul
... Show More