Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance. Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis. Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and two indices—one for actualizing metrological risk and another for its management—are assessed. Findings: We find the all dimensions of the six sigma projects implemented facilitate the correction and adaptation of the main tasks aimed at improving the measurement management system. Research, Practical & Social implications: a risk-based approach and the six sigma method are can enhance the measurement management system and collect feedback on its performance. Originality/value: The merge a risk-based approach and the six sigma method its usefulness as a methodological tool for enhancing measurement management has been demonstrated.
Background: A Catheter-associated with candidiasis infection is the most common nosocomial infection and the objective of this work is to isolate and identify Candida species from catheterized patients by ordinary culture and PCR.Objective:To study the isolation and identification of Candida species from catheterized patients by culture media and polymerase chain reaction(PCR).Methods: One hundred and thirty five Candida species isolates were obtained from urine culture of catheterized specimens from male and female patients , During the period between October 2011 to April 2012 , attending AL-Ramadi general teaching Hospital. A quantitative urine culture for isolation and identification of Candida species was. The isolation of Candida s
... Show MoreThe objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.
... Show MoreIn this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThe rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E
... Show MoreThe construction of development is required to develop various economic sectors with the necessity to meet the various requirement of both individuals and institutions , or through the import process , which must be commensurate with the needs of the market and the economy and development. But in fact , we found that the process of import in Iraq after 2003 took a turn dangerous excesses on limits of philosophy and objectives of the import , which reflected the level of national production as well as the policy of dumping and given to the lack of matching a lot of goods and materials imported for Standards and Measures of quality and stands behind it causes many of them exposure to the market and weak sectors with an o
... Show MoreMake a search on the vegetative parts of the plant local horse guilt of some elements in the Haj Omran area in northern Iraq has included recognition of certain nutrients
The construction of development is required to develop various economic sectors with the necessity to meet the various requirement of both individuals and institutions , or through the import process , which must be commensurate with the needs of the market and the economy and development. But in fact , we find that the process of import in Iraq after 2003 took a turn dangerous excesses on limits of philosophy and objectives of the import , which is reflected at the level of national production as well as the policy of dumping and given and the lack of matching a lot of goods and materials imported for Standards and Measures of quality and stands behind it causes many of them exposure to the market and weak sectors with an overlap betwee
... Show MoreThe study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app
... Show MoreThis research is Interested in how the performance and implementation of factory production engine coolants of the General Company for Electrical Industries of its work, and to facilitate the flow of the decisions of senior management and access to all configurations, to ensure differentiation desired and reduce lost sales, resulting from poor scheduling of operations through the application of certain rules of scheduling operations in the production plant Engines Air-cooler, the objectives of research in identifying the best base and working to reduce the time and cost of Same Rules of Process which are considered the most influential of any organization and thr
... Show More