Safety programmes are considered one of the means to protect workers from different accidents and injuries and also to protect all assets including machines equipment and various materials. In spite of world state interests in occupational safety, this subject didn't get the required attention by senior staff of management at most of our country construction factories and the application of safety programmes still limited and in active. In order to a achieve the goal of the study, scientific method has been pursued to obtain the necessary information related to this study through tours to related companies and their construction factories and review literature that deal with occupational safety subject and their programmes and cost, in a
... Show MorePolymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications. Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different proce
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreCompanies need to educate people about the facts that characterize the business. This is the mission of promotion, it is an important marketing activity, promotion communicates with others and seeks to provide customers with a new business process experience.
Advertising is the most important methods of promotion and the best way to reach an audience. Once the organization advertises its products and services, it can operate in a competitive environment. Marketing competition requires knowledge of humanity that must be affected and convinced. Advertising should create Desires and need for satisfaction. This research comes in the study of visual representations of this psychological incident and how to use it communicatively to create
In this study, four different spectrophotometric methods were applied for determination of cimetidine and erythromycin ethylsuccinate drugs in pure form and in their pharmaceutical preparations. The suggested methods are simple, sensitive, accurate, not time consuming and inexpensive. The results showed the following: The first method: Based on the formation of ion pair complex of each drug with bromothymol blue (BTB) as a chromogenic reagent. The formed complexes were extracted with chloroform and their absorbance values were measured at 427.5 nm for cimetidine and 416.5nm for erythromycin ethylsuccinate; against their reagents blanks. Two different methods, univariate method and multivariate method, were used to obtain the optimum condit
... Show More