Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors
The purpose of this research is to determine the extent to which independent auditors can audit the requirements of e-commerce related to (infrastructure requirements, legislation and regulations, tax laws, and finally human cadres). To achieve this, a questionnaire was designed for auditors. Numerous statistical methods, namely arithmetic mean and standard deviation, have been used through the implementation of the Statistical Packages for Social Sciences (SPSS) program.
The research has reached several results, the most important of which are: There are noobstacles to enabling the auditor to audit the application of the e-commerce requirements as well as the respective(infrastructure requirements, legislation and regulations, t
... Show MoreThis study deals with the orthographic processing ability of homophones
which can account for variance in word recognition and production skills due to
phonological processing. The study aims at: A)Investigating whether the students
can recognize correct usage and spelling comprehension of different homophones
by using appropriate word that overlapped in both phonology and orthography.
B)Assessing spelling production word association to the written form of the
homophone in the sentence comprehension task. To achieve these aims, two tests
have been conducted and distributed on 50 students at first stage at the College of
Education(Ibn-Rushd) for the academic year 2010-2011. The two tests are exposed
to a jury of
The process of capital investment appraisal takes hold the attention of managers and accountants of the industrial companies. This process involves the use of multiple and diverse financial evaluation methods to measure the economic attractiveness of capital investment peojects. This multiplicity and diversity of financial evaluation metods have been the motive of this research to: investigate some organizational variables such as the desired objectives, identify managerial procedures which regulate the capital investment process, specify evaluation methods and examine the relationships between these variables and evaluation methods actually used by a sample of public industrial companies in Jordan.
The data wa
... Show MoreThe world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has
Introduction: Inadequate pain assessment and management is a problem in hospitalized patients that impairs their wellbeing. Intensive care unit nurses’ pain practices are affected by several barriers and enablers. Objectives: The objectives of this study were to determine the level of nurses’ practices and perceived barriers related to pain assessment in critically ill patients. Methodology: A cross-sectional design study was used. Purposive sampling technique was employed, including 100 nurses recruited from 8 intensive care units in Baghdad city, Iraq. The study was conducted from September 1st to October 20th, 2022. The pain assessment and management for critically ill patients survey was used to collect data. Descriptive sta
... Show MorePharmaceutical care is a patient-centered, outcomes oriented practice that requires the pharmacist to work in concert with the patient and the patient’s other healthcare providers to promote health, to prevent disease, and to assess, monitor, initiate, and modify medication use to assure that drug therapy regimens are safe and effective. In addition, the presence of clinical pharmacists has led to a higher quality of patient education and provision of complete detailed information for patients. In developed countries Pharm D has become the professional degree for practice of Pharmacy. The graduates will be enrolled in a pharmacy residency program; admission to the residency programs is available to Pharm D graduates of an accredit
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More