Preferred Language
Articles
/
joe-2127
REVIEW THE ASSESSMENT OF EFFECTS OF LOST TIME INJURIES IN AN INDUSTRIAL SYSTEM BY USING AN EXPLANATORY PROGRAM
...Show More Authors

Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe working environment for all employees to achieve safe workplaces, safe systems of work, and safety understanding within our workforce. Our industry often
has a poor record in dealing with modern and development techniques. Thus, as one of the targets, this leads to perform a helpful program plane to provide guidelines of management, employees to eliminate hazards, given the enormous cost of occupational personal damage in industry and to develop safe work methods work site. This work proposed a general methodology for constructing an explanatory software system to review and analysis workers injuries in a work site. The program language used is Axes, which suitable to shows categories of incidences and estimates costs to workers, employers and society of workplace injuries and work-related ill health. Data of the system was collected in the State Company for Woolen Industries in Al-Kadhumiaa in Iraq.
The resulting is to provide a simple obvious outline system to evaluate lost time injury and the net-costs on safety interfering at the company level to reduce occupational morbidity and generating a helpful system to estimate of the total costs to employers and workers of workplace accidents and work-related ill health.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Synthesis, Characterization, Antimicrobial and Theoretical Studies of V(IV),Fe(III),Co(II),Ni(II), Cu(II), and Zn(II)Complexes with Bidentate (NN) Donar Azo Dye Ligand
...Show More Authors

The new 4-[(7-chloro-2,1,3-benzoxadiazole)azo]-4,5-diphenyl imidazole (L) have been synthesized and characterized by micro elemental and thermal analyses as well as 1H.NMR, FT-IR, and UV-Vis spectroscopic techniques. (L) acts as a ligand coordinating with some metal ionsV(IV), Fe(III), Co(II), Ni(II), Cu(II), and Zn(II). Structures of the new compounds were characterized by elemental and thermal analyses as well as FT-IR and UV-Vis Spectra. The magnetic properties and electrical conductivities of metal complexes were also determined. Study of the nature of the complexes formed in ethanol following the mole ratio method.. The work also include a theoretical treatment of the formed complexes in the gas phase, this was done using the (hyperch

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Energy Storage
Comprehensive Study of <scp>PAN</scp>‐<scp>NaBF<sub>4</sub></scp> Solid Polymer Electrolytes: Insights Into Optical, Structural, Thermal, Electrical, and Electrochemical Properties for Sodium‐Ion Batteries
...Show More Authors
ABSTRACT<p>This research explores the use of solid polymer electrolytes (SPEs) as a conductive medium for sodium ions in sodium‐ion batteries, presenting a possible alternative to traditional lithium‐ion battery technology. The researchers prepare SPEs with varying molecular weight ratios of polyacrylonitrile (PAN) and sodium tetrafluoroborate (NaBF<sub>4</sub>) using a solution casting method with dimethyl formamide as the solvent. Through optical absorbance measurements, we identified the PAN:NaBF<sub>4</sub> (80:20) SPE composition as having the lowest energy band gap value (4.48 eV). This composition also exhibits high thermal stability based on thermogravimetric analysis results. </p> ... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Polyhedron
Novel dichloro (bis {2-[1-(4-methylphenyl)-1H-1, 2, 3-triazol-4-yl-κN3] pyridine-κN}) metal (II) coordination compounds of seven transition metals (Mn, Fe, Co, Ni, Cu, Zn and Cd)
...Show More Authors

Preview PDF
Publication Date
Mon Feb 10 2025
Journal Name
Journal Of Optics
Implementing quantum key distribution based on coincidence detection captured from two different single photon detection modules
...Show More Authors

Quantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services th

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Engineering
Proposed Face Detection Classification Model Based on Amazon Web Services Cloud (AWS)
...Show More Authors

One of the most important features of the Amazon Web Services (AWS) cloud is that the program can be run and accessed from any location. You can access and monitor the result of the program from any location, saving many images and allowing for faster computation. This work proposes a face detection classification model based on AWS cloud aiming to classify the faces into two classes: a non-permission class, and a permission class, by training the real data set collected from our cameras. The proposed Convolutional Neural Network (CNN) cloud-based system was used to share computational resources for Artificial Neural Networks (ANN) to reduce redundant computation. The test system uses Internet of Things (IoT) services through our ca

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Characterization of Novel Methyl 2-(1,7,7-Tri methylbicyclo[2.2.1]hept-2-yieldene)hydrazinecarbodithioate Schiff Bases Derived From Methylhydrazine carbodithioate And Their Bi(III) And Ag(II) Complexes
...Show More Authors

Novel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t

... Show More
View Publication Preview PDF
Crossref