Preferred Language
Articles
/
txiykZgBVTCNdQwCOb8Q
Statistical Evalution of Safety Procedures and Chemical Security in Chemical Laboratories / College Ibn Al Haitham
...Show More Authors
Abstract<p>In order to minimize the significant incidents in chemical laboratories, specially the academic laboratories, one must be able to identify and evaluate hazards. Familiar with safety rules and responsibilities. Assessing implementation of safety rules and securities. The aim of this paper is to for the evaluate and assess the of chemical safety procedures and chemical policies in academic laboratories using statistical questionnaire. A form is written, suggested two main parts, safety and security. Safety part includes three classes, hardware requirements, training and application of safety procedures. the second part is security. The form design is based on four points Likert scale. The forms were distributed to more than 90 persons who works in the chemistry department laboratories, of Ibn Al Haitham college of education, university of Baghdad. Statistical analysis is carried out using IBM Statistics SPSS, Version 24,2016. an internal consistency reliability was estimated using Cronbach’s alpha measuring scale, a value of 83.4 % was achieved it indicates a good reliability. The research emphasized a shortage in the application of safety procedures due to the lack of hardware requirements, as well as training. Control banding chemical uses in research and education laboratories, checklists and development of standard operating procedures are the most important things to achieve the safety in chemical laboratories.</p>
Scopus Crossref
View Publication
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparative Statistical Analysis
...Show More Authors

In this paper, a statistical analysis compared the pattern of distribution of spending on various goods and services and to identify the main factors that control the rates of spending between the survey of social and economic status of families in Iraq for the year (2007) and the survey of Iraq knowledge net work (IKN) for the year (2011), which were carried out by the Central Bureau  of Statistics through the use of factor analysis and cluster analysis, using the ready statistical software package ready (SPSS) to gain access to the results.

 

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Safety Nets and Sustainable Development in Fragile Environments: A Field Social Study of Slums in the City of Baghdad/Al-Karkh: هبة صالح مهدي, عدنان ياسين مصطفى
...Show More Authors

Almost human societies are not void of poverty, as the latter accompanied the emergence of humanity, and it, thus, represents an eternal problem. To advance an individual's reality and raise the level of the poor social classes, social security networks have been established. Such networks operate in society following social systems and laws to provide food, and material support. Besides, such networks help to rehabilitate the individual academically and vocationally. They empower vulnerable groups through the establishment of courses and workshop, provide (conditional) subsidies related to the health and educational aspects in order to achieve the sustainable development goals of (2030), and apply developmental roles of social safety ne

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Chemistry And Materials Research
Synthesis, Physico-Chemical and Antimicrobial Activities Co(II),Ni (II) ,Cu(II), Zn(II),Cd(II) and Hg(II) Mixed- Ligand Complexes of L- Alanine and Trimethoprim Antibiotic
...Show More Authors

The Co (II), Ni (II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Alanine ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using melting point, conductivity measurement and determination the percentage of the metal in the complexes by flame (AAS). Magnetic susceptibility, Spectroscopic Method [FTIR and UV-Vis]. The general formula have been given for the prepared mixed ligand complexes [M(Ala)2(TMP)(H2O)] where L- alanine (abbreviated as (Ala ) = (C5H9NO2) deprotonated primary ligand, L- Alanine ion .= (C5H8NO2 -) Trimethoprim (abbreviated as (TMP ) = C10H11N3O3S M(II) = Co (II),Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II). The results showed that the deprotonated L- Alanine by KOH (Ala

... Show More
Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
What came as a language in the book to explain Ibn Aqeel on Alfiya Ibn malek
...Show More Authors

It is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 26 2010
Journal Name
Wireless Personal Communications
Security Problems in an RFID System
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Theoretical Investigation on Chemical Bonding of the Bridged Hydride Triruthenium Cluster: [Ru3 (μ-H)( μ3-κ2-Hamphox-N,N)(CO)9]
...Show More Authors

Ruthenium-Ruthenium and Ruthenium–ligand interactions in the triruthenium "[Ru3(μ-H)(μ3-κ2-Hamphox-N,N)(CO)9]" cluster are studied at DFT level of theory. The topological indices are evaluated in term of QTAIM (quantum theory of atoms in molecule). The computed topological parameters are in agreement with related transition metal complexes documented in the research papers. The QTAIM analysis of the bridged core part, i.e., Ru3H, analysis shows that there is no bond path and bond critical point (chemical bonding) between Ru(2) and Ru(3). Nevertheless, a non-negligible delocalization index for this non-bonding interaction is calculated

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 28 2022
Journal Name
Al–bahith Al–a'alami
Content of Data Journalism in Security Topics - Security Media Cell Model Research extracted from a master’s thesis
...Show More Authors

This paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Safety management in private construction project in Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Thu Sep 19 2019
Journal Name
Engineering, Construction And Architectural Management
Influential safety technology adoption predictors in construction
...Show More Authors
Purpose

Existing literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.

Design/methodology/approach

In total, 26 key technology adoption predictors

... Show More
View Publication
Scopus (61)
Crossref (63)
Scopus Clarivate Crossref