Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance. Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis. Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and two indices—one for actualizing metrological risk and another for its management—are assessed. Findings: We find the all dimensions of the six sigma projects implemented facilitate the correction and adaptation of the main tasks aimed at improving the measurement management system. Research, Practical & Social implications: a risk-based approach and the six sigma method are can enhance the measurement management system and collect feedback on its performance. Originality/value: The merge a risk-based approach and the six sigma method its usefulness as a methodological tool for enhancing measurement management has been demonstrated.
Objective(s): The aim of this study is to assess the impact of social phobia upon self-esteem of nursing
collegians.
Methodology: A Cross-sectional study is carried out at University of Baghdad, Karkuk, Thi-Qar, and Kufa,
colleges of nursing from Feb 8
th
, 2011 to Sep. 25th, 2011. A sample of all first class nursing collegians (N=330)
were selected from a probability sample of nursing colleges by dividing Iraq to three geographical areas (South,
North, and Middle Euphrates) in addition to Baghdad. The data were collected through the use of selfadministered
technique as a mean for data collection, by using a questionnaire that consists of three parts:
First part was the socio-demographic data form; the second o
Objective: To identified the relationship between general and spinal Anesthesia upon breastfeeding and (demographic &reproductive) : Comparative Study. Methodology: The present study employs a descriptive comparative design held at the labor and delivery room , operational room for cesarean section and maternity word in maternity department at Al Emamain Al Kadhamain Medical City in Baghdad city. Data collection was initiated on 2nd January to end of March /2014. Purposive sample consisted of (150) mother and her neonate, The study sample divided into three groups:(50) under general anesthesia , (50) under
Co-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreWith the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More