Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe working environment for all employees to achieve safe workplaces, safe systems of work, and safety understanding within our workforce. Our industry often
has a poor record in dealing with modern and development techniques. Thus, as one of the targets, this leads to perform a helpful program plane to provide guidelines of management, employees to eliminate hazards, given the enormous cost of occupational personal damage in industry and to develop safe work methods work site. This work proposed a general methodology for constructing an explanatory software system to review and analysis workers injuries in a work site. The program language used is Axes, which suitable to shows categories of incidences and estimates costs to workers, employers and society of workplace injuries and work-related ill health. Data of the system was collected in the State Company for Woolen Industries in Al-Kadhumiaa in Iraq.
The resulting is to provide a simple obvious outline system to evaluate lost time injury and the net-costs on safety interfering at the company level to reduce occupational morbidity and generating a helpful system to estimate of the total costs to employers and workers of workplace accidents and work-related ill health.
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
A solar cell was manufactured from local materials and was dyed using dyes extracted from different organic plants. The solar cell glass slides were coated with a nano-porous layer of Titanium Oxide and infused with two types of acids, Nitric acid and Acetic acid. The organic dyes were extracted from Pomegranate, Hibiscus, Blackberry and Blue Flowers. They were then tested and a comparison was made for the amount of voltage they generate when exposed to sunlight. Hibiscus sabdariffa extract had the best performance parameters; also Different plants give different levels of voltage.