Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe working environment for all employees to achieve safe workplaces, safe systems of work, and safety understanding within our workforce. Our industry often
has a poor record in dealing with modern and development techniques. Thus, as one of the targets, this leads to perform a helpful program plane to provide guidelines of management, employees to eliminate hazards, given the enormous cost of occupational personal damage in industry and to develop safe work methods work site. This work proposed a general methodology for constructing an explanatory software system to review and analysis workers injuries in a work site. The program language used is Axes, which suitable to shows categories of incidences and estimates costs to workers, employers and society of workplace injuries and work-related ill health. Data of the system was collected in the State Company for Woolen Industries in Al-Kadhumiaa in Iraq.
The resulting is to provide a simple obvious outline system to evaluate lost time injury and the net-costs on safety interfering at the company level to reduce occupational morbidity and generating a helpful system to estimate of the total costs to employers and workers of workplace accidents and work-related ill health.
Basically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThe study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable
... Show MoreThe study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MorePulsatile drug delivery systems (PDDS) are developed to deliver drug according to circadian behavior of diseases. They deliver the drug at the right time, action and in the right amount, which provides more benefit than conventional dosages and increased patient compliance. The drug is released rapidly and completely as a pulse after a lag time. These systems are beneficial for drugs with chrono-pharmacological behavior, where nighttime dosing is required and for the drugs having a high first-pass effect and having specific site of absorption in the gastrointestinal tract. This article covers methods and marketed technologies that have been developed to achieve pulsatile delivery. Diseases wherein PDDS are promising include asthma, peptic u
... Show MoreThe aim of this article is to solve the Volterra-Fredholm integro-differential equations of fractional order numerically by using the shifted Jacobi polynomial collocation method. The Jacobi polynomial and collocation method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are considered in the Caputo sense. Numerical examples are given to show the accuracy and reliability of the proposed technique.