Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe working environment for all employees to achieve safe workplaces, safe systems of work, and safety understanding within our workforce. Our industry often
has a poor record in dealing with modern and development techniques. Thus, as one of the targets, this leads to perform a helpful program plane to provide guidelines of management, employees to eliminate hazards, given the enormous cost of occupational personal damage in industry and to develop safe work methods work site. This work proposed a general methodology for constructing an explanatory software system to review and analysis workers injuries in a work site. The program language used is Axes, which suitable to shows categories of incidences and estimates costs to workers, employers and society of workplace injuries and work-related ill health. Data of the system was collected in the State Company for Woolen Industries in Al-Kadhumiaa in Iraq.
The resulting is to provide a simple obvious outline system to evaluate lost time injury and the net-costs on safety interfering at the company level to reduce occupational morbidity and generating a helpful system to estimate of the total costs to employers and workers of workplace accidents and work-related ill health.
There are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm. It is necessary to make this algorithm more efficient and powerful through
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MoreIt is known that images differ from texts in many aspects, such as high repetition and correlation, local structure, capacitance characteristics and frequency. As a result, traditional encryption methods can not be applied to images. In this paper we present a method for designing a simple and efficient messy system using a difference in the output sequence. To meet the requirements of image encryption, we create a new coding system for linear and nonlinear structures based on the generation of a new key based on chaotic maps.
The design uses a kind of chaotic maps including the Chebyshev 1D map, depending on the parameters, for a good random appearance. The output is a test in several measurements, including the complexity of th
... Show Moreנושא הדאיקסיס בצורה כללית הוא אחד הנושאים הלשוניים החשובים, הנושא הזה שייך לתחום הפרגמאטיקה, חשיבותו טמונה בכך שהוא אמצע הבעה חשוב בחיי היומיום שלנו, מכיוון שהוא נחשב אחד מאמצעי התקשורת בין האנשים. נושא זה קשור בקשר הדוק בהקשר, משום שהוא עוזר להסיר הדו-משמעות שבאמצעותו אנו מגיעים לרפרנטים המכוונים בצורה מדוייקת.
In this work, the preparation of new multidentate Schiff-base lig and and its metal complexes are described. The formation of the lig and{ 2,2`((5-methyl-1,3-phenylene)-bis-(oxy))-bis-N`(E`)-2- hydroxybenzylideneacetohydrazide}[H2L] was prepared from the reaction {2,2-((5-methyl-1,3-phenylene)-bis-(oxy))- di-(acetohydrazide)}[M]precursor and salicylaldehyde in a 1:2 mole ratio, respectively. The reaction of the lig and [H2L] with (Cr+3 , Mn+2 and Fe+2 )metal ions in a 1:2 (L:M) mole ratio. Ligand and complexes were characterised via spectroscopic analyses; [FT-IR, UV-Vis spectroscopy,(C.H.N) microanalysis, chloride content, thermal analysis(TG), electrospray mass, magnetic susceptibility and conductivity measurements. The characterisation d
... Show MoreLaboratory studies were conducted at the biological control unit, college of Agriculture, University of Baghdad to evaluate some biological aspects of the predator Chilocorus bipustulatus (Coleoptera: Coccinellidae), which is considered one of the most important predators on many insect pests, especially the scale insect, Parlatoria blanchardi, (Homoptera: Diaspididae) on date palms. The results showed that biological parameters of the predator were varied according to different degree of temperature. Egg incubation period was significantly different and reached to 7.5 and 5.44 day at 25 and 30°C respectively, Fertility was the same 100% at both temperature degrees. Larval growth periods were 17.41 and 16.12 day as well as the mortality du
... Show MoreThe [2-hydroxy-1, 2-diphynel-ethanone oxime] was reacted with 1, 2-dichloroethan to give the new ligand [H2L]. this ligand was reacted with some metal ions (Co (II), Ni (II), Cu (II), Zn (II) and Cd (II) in methanol as a solvent to give a series of new (1: 1) complexes of the general formula [M (HL)] Cl,(where: M= Co (II), Ni (II), Cu (II), Zn (II) and Cd (II)) are isolated All compounds have been characterized by spectroscopic methods [IR, UV-Vis] atomic absorption. Chloride content along with conductivity measurements. From the above data the proposed molecular structure for (Co, Cu, Ni, Zn and Cd) complexes adopting a tetrahedral structure
Infrared photoconductive detectors working in the far-infrared region and room temperature were fabricated. The detectors were fabricated using three types of carbon nanotubes (CNTs); MWCNTs, COOH-MWCNTs, and short-MWCNTs. The carbon nontubes suspension is deposited by dip coating and drop–casting techniques to prepare thin films of CNTs. These films were deposited on porous silicon (PSi) substrates of n-type Si. The I-V characteristics and the figures of merit of the fabricated detectors were measured at a forward bias voltage of 3 and 5 volts as well as at dark and under illumination by IR radiation from a CO2 laser of 10.6 μm wavelengths and power of 2.2 W. The responsivity and figures of merit of the photoconductive detector
... Show More