Abstract
Objective(s): To evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status.
Methodology: A descriptive design is employed throughout the present study to evaluate housekeeping services staff work environment and their health status, as well as to determine the impact of the work environment upon their health status from November 3rd 2017 to June 30th 2018. A purposive “nonprobability” sample of (101) housekeeping staff is selected for the present study. An instrument is constructed for the purpose of the study and it is consists of (2) parts: (I) Evaluation of work environment, and (II) Evaluation of housekeeping staff's health status. A pilot study is conducted for the determination of the instrument’s validity and reliability. The content validity of the instrument is determined by panel of (35) experts. So, the instrument is considered adequately valid measure after performing the modifications that based on the experts’ responses. The internal consistency reliability is determined through split-half technique and the computation of Cronbach alpha correlation coefficient of (r=0.87) which is indicated that the instrument is adequately reliable measure. Data are collected through the use of the study instrument and the structured interview technique as means of data collection. Data are analyzed through descriptive statistical analysis approach of frequency, percentage, mean, total score and range and inferential statistical data analysis approach of linear regression.
Results: The study indicates that the work environment is moderately risky (92.1%) and
the housekeeping staff health status is ranging between fair (42.6%) to good (42.6%) for most of them. The biological, chemical and physical aspects of work environment have great impact upon the housekeeping services staff health status.
Recommendations: The study recommends that work environment can be monitored to maintain occupational health and safety; periodic medical examination has to be initiated and presented to the housekeeping services staff and further research can be conducted on different settings and large sample size.
One of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe formation of Co(II), Ni(II), Cu(II), Zn(II), and Cd(II)-complexes (C1-C5) respectively was studied with new Schiff base ligand [benzyl(2-hydroxy-1-naphthalidene) hydrazine carbodithioate derived from reaction of 2-hydroxy-1-naphthaldehyde and benzyl hydrazine carbodithioate. The suggested structures of the ligand and its complexes have been determined by using C.H.N.S analyzer, thermal analysis, FT-IR, U.V-Visible, 1HNMR, 13CNMR , conductivity measurement , magnetic susceptibility and atomic absorption. According to these studies, the ligand coordinates as a tridentate with metal ions through nitrogen atom of azomethane , oxygen atom of hydroxyl, and sulfur atom of thione
... Show MoreThe ligand 4-(2-aminmo-5-nitro-phenylazo)-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one derived from 4-aminoantipyrine and 4-nitroaniline was synthesized. The synthesized ligand was characterized by 1HNMR, FT-IR, UV-Vis spectra and (C.H.N) analysis. Complexes of (YIII and LaIII ) with the ligand were prepared in aqueous ethanol with a 1:2 M:L ratio and at optimum pH. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis spectra,(C.H.N) analysis and conductivity measurement. The stoichiometry of complexes was studied by the mole ratio and job methods. A concentration range (1×10-4 - 3×10-4 M) obeyed Beer's law, the complex solutions show high values of molar absorption. On the basis of physicochemical
... Show MoreAtenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show More