Preferred Language
Articles
/
MRZTR4gBVTCNdQwCDHa7
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors were identified and classified using a combination of literature review and an expert panel. The level of influence for each identified safety technology adoption predictor was assessed and ranked using the Relative Importance Index. Analysis of variance was performed as well to assess the potential difference in perceived level of importance for the predictors when the study participants were clustered according to work experience and company size.

Findings

Statistical analysis indicates that 12 out of the 26 predictors identified are highly influential regarding technology adoption decision-making in construction. Technology reliability, effectiveness and durability were ranked as the most influential predictors. The participants who work for small companies and who had less than ten years of experience rated individual- and technology-related predictors significantly lower than the experienced participants working for medium and large companies.

Practical implications

The present study provides construction researchers and practitioners with valuable information regarding safety technology predictors and their magnitude, both of which are essential elements of a successful safety technology adoption process. Improved technology adoption can enhance workplace safety and minimize worker injuries, providing substantial benefits to the construction industry.

Originality/value

This study contributes to technology adoption knowledge by identifying and quantifying the influential predictors of safety technologies in relation to different organizational contexts. The study informs the need to develop an integrated conceptual model for safety technology adoption.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Nov 10 2020
Journal Name
International Journal Of Psychosocial Rehabilitation
Hybridization Methodology of ARMA-FIGARCH Model to Examine Gasoline Data in Iraq
...Show More Authors

Preview PDF
Publication Date
Wed Dec 04 2013
Journal Name
1st Post – Graduate Students Conference, Alnahrain University / College Of Engineering
Convection Heat Transfer in Horizontal Annulus Porous Media with Rotating Outer Cylinder
...Show More Authors

A numerical investigation of mixed convection in a horizontal annulus filled with auniform fluid-saturated porous medium in the presence of internal heat generation is carried out.The inner cylinder is heated while the outer cylinder is cooled. The forced flow is induced by thecold outer cylinder rotating at a constant angular velocity. The flow field is modeled using ageneralized form of the momentum equation that accounts for the presence of porous mediumviscous, Darcian and inertial effects. Discretization of the governing equations is achieved usinga finite difference method. Comparisons with previous works are performed and the results showgood agreement. The effects of pertinent parameters such as the Richardson number and internalRay

... Show More
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Global Pharma Technology
GC/MS analysis of terpenes of Boswellia serrata resin found in Iraq
...Show More Authors

Objective: The aim of this work was to detect terpenes other than boswellic acid derivatives in olibanum of Boswellia Serrata found in Iraq. Methods: The olibanum of Boswellia Serrata was macerated in methanol for one day, then filtration. Filter at was concentrated till reddish brown syrupy residue was gained, (3%) potassium hydroxide was added till basification. This basic solution was stirred continuously until a uniform emulsion was formed, then extracted with chloroform in a separatory funnel; the chloroform fraction was analyzed by GC /MS spectrometry. Results: GC /MS analysis reveal the presence of terpenes and non-terpenes constituents. Conclusion: Most of the detected terpenes were sesquiterpenes and the least one was di-terpenes.

View Publication
Scopus
Publication Date
Sun Oct 15 2023
Journal Name
Revista Bionatura
Estimation of amino acid concentrations in the kidney of albino mice embryo
...Show More Authors

Amino acids are the basic building block for peptides and proteins. They are raw materials for generating hormones, purines, pyrimidines and vitamins. Amino acids also provide the body with energy through their carbon structures. The study analyzed the amino acid in the kidneys of the albino mice embryo at 17 and 19 gestation days, using a high-performance liquid chromatography device (HPLC). Samples were obtained after removing them from the embryo and placing them in an ice bath to prevent cell lysis and acid loss. The study found 18 amino acids in the kidneys of the albino mice embryo. They are Asparagine (Asn), Glutamine (Glu), Serine (Ser), Glycine (Gly), Threonine (Thr), Histidine (His), Cysteine (Cys), Alanine (Ala), Proline

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
"The role of quality costs in reducing the cost of industrial" products
...Show More Authors

Abstract :-

The aim of the research is to explain the role of quality costs their  importance and their classification, and to clarify the most important tools that help to reduce costs.

In order to achieve the objective of the research and test hypotheses adopted the descriptive approach, as well as the adoption of the analytical approach in the study of applied data has been relied upon in providing data on the financial and production reports of the research sample company, the data were used to study and analyze financial and productivity reports . A number of conclusions have been reached the most important being the following

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2023
Journal Name
College Of Islamic Sciences
Financial policy in the caliphate of Imam Ali (peace be upon him)
...Show More Authors

 

Praise be to God who has guided us, and we would not have been guided had it not been for the guidance of God Almighty. The life of the Commander of the Faithful, Imam Ali bin Abi Talib, peace be upon him, represented the highest meanings of sacrifice, redemption, courage, heroism, patience, altruism, and truth, which were embodied in his unique personality, whose counterpart is rare, if not unparalleled in history. Except for the person of the Holy Prophet Muhammad (may God bless him and his family and grant them peace). In this research, we have presented pictures from the life of Imam Ali bin Abi Talib (peace be upon him), as we have clarified his life, upbringing, conversion to Islam and his ma

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
...Show More Authors

The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera

... Show More
View Publication
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Estimation levels of CTHRC1and some cytokines in Iraqi patients with Rheumatoid Arthritis
...Show More Authors

Collagen triple helix repeat containing-1 (CTHRC1) is an essential marker for Rheumatoid Arthritis (RA), but its relationship with pro-inflammatory, anti-inflammatory, and inflammatory markers has been scantily covered in extant literature. To evaluate the level of CTHRC1 protein in the sera of 100 RA patients and 25 control and compare levels of tumour necrosis factor alpha (TNF-α), interleukin 10 (IL-10), RA disease activity (DAS28), and inflammatory factors. Higher significant serum levels of CTHRC1 (29.367 ng/ml), TNF-α (63.488 pg/ml), and IL-10 (67.1 pg/ml) were found in patient sera as compared to that in control sera (CTHRC1 = 15.732 ng/ml, TNF-α = 33.788 pg/ml, and IL-10 = 25.122 pg/ml). There was no significant correlati

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 20 2020
Journal Name
Talent Development & Excellence
Turn-Taking in Conversation between a Chef and Boss and among Chefs
...Show More Authors

DBN Rashid, Talent Development & Excellence, 2020

View Publication
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref