Preferred Language
Articles
/
alkej-589
Correcting Working Postures in Water Pump Assembly Tasks using the OVAKO Work Analysis System (OWAS)
...Show More Authors

Ovako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construction of real life workstation is modified simultaneously by redesign suggestions in the values of location (positioning) factors for stacking workstation. The simulation workstation executed by mean of parametric CAD software. That modifications lead to improvement in the percentage of harmful postures. It was therefore recommended the use of supplementary methods is required to identify ergonomic risk factors for handling work or other hand-intensive activities on industry sites. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 15 2018
Journal Name
Arab Science Heritage Journal
نحو نظام نحو نظام لغوي عربي متوازن في المساواة بين الرجل والمرأة
...Show More Authors

We must live in an era dominated by the call for equality between men and women, in which the voices of advocates of gender integration were heard. After women opened their doors to compete with their brother, Knowledge, and culture in the various forms of life, language as a science of the time and knowledge of the other had to match this reality and express the most accurate expression of this task

View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
(The trade-off between privatization Options General contracting firms Using the strategic analysis of the external environment
...Show More Authors

Discussed the research variables are important, privatization options and strategic analysis of the external environment, and that the purpose of the research is the trade-off between privatization options and choose the most appropriate alternative in proportion to the external environment, the research aims to determine the privatization the most appropriate option for companies and public contracting, showing the importance of the study provide the privatization of public companies as a strategy can all its way public sector organizations from the transfer of work practices or private sector organizations and mechanisms to it as contributing to improving the level of skills Develop the current and future level of performance,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Estimating concentration of toxic ions Arsenic in water by using Photonic Crystal Fiber based on Surface Plasmon Resonance (SPR)
...Show More Authors

In this work, an enhanced Photonic Crystal Fiber (PCF) based on Surface Plasmon Resonance (SPR) sensor using a sided polished structure for the detection of toxic ions Arsenic in water was designed and implemented. The SPR curve can be obtained by polishing the side of the PCF after coating the Au film on the side of the polished area, the SPR curve can be obtained. The proposed sensor has a clear SPR effect, according to the findings of the experiments. The estimated signal to Noise Ratio (SNR), sensitivity (S), resolution (R), and Figures of merit (FOM) are approaching; the SNR is 0.0125, S is 11.11 μm/RIU, the resolution is 1.8x〖10〗^(-4), and the FOM is 13.88 for Single-mode Fiber- Photonic Crystal Fiber- single mode Fiber (SMF-P

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 16 2024
Journal Name
Light & Engineering
The Design and Experimental Realization of a Laser-Based Heating System Using Recycled Laser Module
...Show More Authors

Laser is a powerful device that has a wide range of applications in fields ranging from materials science and manufacturing to medicine and fibre optic communications. One remarkable

View Publication
Publication Date
Sun Sep 03 2017
Journal Name
Baghdad Science Journal
Calculation of Lambda Doubling for 7LiH1 molecule Using the System band emission for electronic transmissions
...Show More Authors

The A2?u-X1?g+ emission band system of 7LiH1 molecule has been calculated for Lambda doubling. The relation between wave number ?p , ?Q , ?R conducted the energies of the state of rotation F (J), and (J + 1) with rotational quantum number J, respectively, of 7LiH1 molecule for statehood A2?u using the rotation, fixed vibrational states of both the ground and raised crossovers vibrational against ???= 0 to V ' = 0-4using rotational levels J = 0 to J = 20 have found.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering Science And Technology
Membrane Fouling Reduction for Reverse Osmosis System Using Zeta Rod
...Show More Authors

Reverse osmosis membrane desalination is one of the most significant water treatments that is used to offer freshwater. The aim of this research is to study the effect of controlling the value of the zeta potential on the suspended particles in the water and the proximity of the membrane surfaces in the colloidal solution, to keep the water stable electrically and disperse the colloidal particles. To achieve this aim, the experimental study was conducted in the Sanitary Engineering Laboratory, in the engineering college - University of Baghdad. Two systems were set up, one worked normally and the other worked by using the zeta rod placed before the reverse osmosis membrane. The results showed that the effect of the zeta rod increas

... Show More