Health and safety problem can be described by statistics it can only be understood by knowing and feeling the pain, suffering, and depression. Health and safety has a legal responsibility to protect it for everyone who can affect in the workplace. This includes manufacturers, suppliers, designers and controllers of work places and employees. Work injury is one of the major problems in manufacturing and production systems industries; it is reduced production efficiency and affects the cost. To gain flexibility from a traditional manufacturing system and production efficiency, this paper is about the application of estimating technology to preview and synthesis of Lost Time of Work Injuries in industry systems aims to provide a safe working environment for all employees to achieve safe workplaces, safe systems of work, and safety understanding within our workforce. Our industry often
has a poor record in dealing with modern and development techniques. Thus, as one of the targets, this leads to perform a helpful program plane to provide guidelines of management, employees to eliminate hazards, given the enormous cost of occupational personal damage in industry and to develop safe work methods work site. This work proposed a general methodology for constructing an explanatory software system to review and analysis workers injuries in a work site. The program language used is Axes, which suitable to shows categories of incidences and estimates costs to workers, employers and society of workplace injuries and work-related ill health. Data of the system was collected in the State Company for Woolen Industries in Al-Kadhumiaa in Iraq.
The resulting is to provide a simple obvious outline system to evaluate lost time injury and the net-costs on safety interfering at the company level to reduce occupational morbidity and generating a helpful system to estimate of the total costs to employers and workers of workplace accidents and work-related ill health.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreObjective. This study aimed to evaluate the orthodontic bond strength and enamel-preserving ability of a hydroxyapatite nanoparticles-containingself-etch system following exposure to various ageing methods. Materials and Methods. Hydroxyapatite nanoparticles (nHAp) were incorporated into an orthodontic self-etch primer (SEP, Transbond™ plus) in three different concentrations (5%, 7%, and 9% wt) and tested versus the plain SEP (control) for shear bond strength (SBS), adhesive remnant index (ARI) scores, and enamel damage in range-finding experiments using premolar teeth. The best-performing formulation was further exposed to the following four artificial ageing methods: initial debonding, 24 h water storage, one-month water stora
... Show MoreBackground :The incidence of bile ducts injuries( BDI )has risen from) 0.1 to 0.2%( to) 0.4 to 0.6% ( between the era of open cholecystectomy( O C) and the age of laoaroscopic cholycystectomy( LC.) The aim of the study is to review the management and surgical outcome of the bile duct injuries in gastroenterology and hepatology teaching hospital .Methods: This study is Prospective, done in G.I.T hospital ,From January 2008 –to –February 2011, patients included in this study had prevouse history of cholecystectomy which followed by sign and symptoms of bile duct injures .Most patients have been reffered from other hospitals,supprting therapy were given to them and investigations performed to evaluate the the type of injureis ,minor inj
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreLiquefied petroleum gases (LPG) consist of hydrocarbons obtained by refining crude oil, either from propane or butane or a mixture of the two. There are often other components such as propylene, butylene or other hydrocarbons, but they are not the main component. The study aims to review previous studies dealing with designing an LPG system to deliver gas to residential campuses and buildings. LPG is extracted from natural gas NG by several processes, passing through fractionation towers and then pressuring into CNG storage tanks. Gas contains several problems, including gas leakage through the pipes and leads to fires or explosions in LPG storage and distribution tanks, so safety conditions were taken in the design and implementation. T
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512
... Show MoreABSTRACT Studying the positive and negative effects resulted from the industrial projects and laying down the comprehensive planning bases to the urban development projects which insure retaining the social, economic and environmental development, taking in to consternation the time factor within the planning process which is considered the most important factor that determine the extent of the efficient selection to the site and not interpenetrate in the industrial activities and efficiency and calculating its future expansions away from the residential areas. It is more favorable to plan the industrial areas of apparent pollution outside the bounds of the basic plan to limit the negative effects on the environment and providing
... Show More
