Grass trimming operation is widely done in Malaysia for the purpose of maintaining highways. Large number of operators engaged in this work encounters high level of noise generated by back pack type grass trimmer used for this purpose. High level of noise exposure gives different kinds of ill effect on human operators. Exact nature of deteriorated work performance is not known. For predicting the work efficiency deterioration, fuzzy tool has been used in present research. It has been established that a fuzzy computing system will help in identification and analysis of fuzzy models fuzzy system offers a convenient way of representing the relationships between the inputs and outputs of a system in the form of IF-THEN rules. The paper presents a fuzzy model for predicting the effects of noise pollution on human work efficiency as a function of noise level, exposure time and age of the operators.
This study aims to know the role of strategic leadership to achieving competitiveness in industrial establishments by identifying the respondents’ perceptions about the level of availability of dimensions of leadership strategies (creativity and innovation, risk tolerance, available opportunities) in Bashir Al-Siksek & Partners Company for the manufacture of sanitary and plastic ware in Gaza strip
To achieve this, a questionnaire was developed and distributed to a sample of managers, auditors, accountants, and administrative employees in the study sample company. The questionnaire tool was distributed to 60 employees and employees, of which (52) were retrieved, or 86.6%, and (8) were excluded for la
... Show MoreThe present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreResearch Summary
The research revolves around the collection of pending hadiths on Abdullah bin Amr bin Al-Aas, may God be pleased with them, and it is required in these hadiths that they be among those in which there is no room for diligence, such as telling about unseen matters, signs of the Hour, or a statement of virtue and reward for obedience, or punishment for disobedience.
The research consists of an introduction, two topics, and a conclusion of the first topic in the translation of Abdullah bin Amr bin Al-Aas, and the second topic, the pending hadiths of Abdullah bin Amr bin Al-Aas, may God be pleased with them, in which there is no room for diligence in collecting and studying
At the end of this rese
Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreEducation is a process of learning and education at the same time. As the conditions of modern life necessitate every person to keep learning, education has become a necessity to meet life needs. The society today is concerned with the educational process and aims to live up the expectations. Since education is an integral part of education and its means, it has become as a mean to achieve its purposes. The educational environment was a traditional environment limited to specific inputs, possibilities and stimulus of both teacher and student. Due to the latest advancement, the educational environment has been expanded to become a rich, with strong connections. It has expanded to encompass the entire global environment. The current
... Show MoreA space X is named a πp – normal if for each closed set F and each π – closed set F’ in X with F ∩ F’ = ∅, there are p – open sets U and V of X with U ∩ V = ∅ whereas F ⊆ U and F’ ⊆ V. Our work studies and discusses a new kind of normality in generalized topological spaces. We define ϑπp – normal, ϑ–mildly normal, & ϑ–almost normal, ϑp– normal, & ϑ–mildly p–normal, & ϑ–almost p-normal and ϑπ-normal space, and we discuss some of their properties.
Long before the pandemic, labour force all over the world was facing the quest of incertitude, which is normal and inherent of the market, but the extent of this quest was shaped by the pace of acceleration of technological progress, which became exponential in the last ten years, from 2010 to 2020. Robotic process automation, work remote, computer science, electronic and communications, mechanical engineering, information technology digitalisation o public administration and so one are ones of the pillars of the future of work. Some authors even stated that without robotic process automation (RPA) included in technological processes, companies will not be able to sustain a competitive level on the market (Madakan et al, 2018). R
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef
... Show More