After studying the reality of application to occupational safety in new Iraqi building projects and sampling the situation wilt that in developed and neighboring countries, researcher found that there is a big gap in the level of safety application conditions, this indicates the need fora quick and clear reference for local engineers to use it on site for safety conditions in their projects . As a case study the monitors work the researcher studied a huge project in the United Arab Emirates.This project considered for safety requirements to highest grades. This case study may be far away from the projects in Iraq, but we hope to rise the Iraqi work level in the near future. After seeing the way of administration work and how they were rated the severity of each phase of the work, an idea was builtabout the most dangerous situations in projects with multiple floorsbuildings. To find multiple solutions to the risk, researchers identified 46 cases with their ratings, type of perceived risk in each case, and displayed a format survey to the most important specialized institutions and companies operating in Iraq and the United Arab Emirates. Finally theresearcher takes the results,and format a software that any user can use in his personal computer to studythe expected risk,how to avoid it and how to deal with it if it happens.
With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw
... Show MoreBackground: Osteogenesis imperfecta (OI) is a rare congenital condition that results in bone fragility, recurrent fractures, and various extra-skeletal manifestations. Currently, intravenous bisphosphonate is the mainstay of medical treatment in OI. Objective: To identify the effect of current management strategies on Iraqi children diagnosed with OI. Methods: A retrospective study enrolled OI patients who were registered in Central Child Teaching Hospital, Baghdad, Iraq, from January 2015 to December 2022. We enrolled confirmed OI cases (either clinically and/or radiologically) who received cyclic pamidronate therapy for at least 3 cycles. They neither received other types of bisphosphonates nor underwent surgical intervention. Res
... Show MoreBackground :The incidence of bile ducts injuries( BDI )has risen from) 0.1 to 0.2%( to) 0.4 to 0.6% ( between the era of open cholecystectomy( O C) and the age of laoaroscopic cholycystectomy( LC.) The aim of the study is to review the management and surgical outcome of the bile duct injuries in gastroenterology and hepatology teaching hospital .Methods: This study is Prospective, done in G.I.T hospital ,From January 2008 –to –February 2011, patients included in this study had prevouse history of cholecystectomy which followed by sign and symptoms of bile duct injures .Most patients have been reffered from other hospitals,supprting therapy were given to them and investigations performed to evaluate the the type of injureis ,minor inj
... Show MoreTor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show Moreتتحقق اهداف الدول عبر توظيف امكانياتها ومواردها ، وهذا التوظيف يقترن بوسائل مختلفة باختلاف الامكانيات المتاحة. وتتفاوت هذه الوسائل ما بين الاكراه والترغيب ، واحياناً من الممكن استخدام كلا الوسيلتين ، وتندرج هذه الوسائل من حيث تصنيفها ضمن نوعين رئيسين هما: القوة الصلبة ]القوة العسكرية والاقتصادية[ والقوة الناعمة ]استخدام جميع ادوات الترغيب وتسخيرها من اجل ان تُعجب بها الدول الاخرى وتنصاع
... Show MoreCo-composting process can be acquired by combining organic fraction of municipal solid waste (OFMSW) with sewage sludge (SS) and mature compost (MC) as enhancement and bulking agent to overcome the problems of municipal solid waste and wastewater treatment plants besides the finally produced fertilizer usage for agriculture and horticulture. The effects of different mixture ratios of (OFMSW), (SS) and (MC) on the performance of composting process were investigated in this study. Piles of about 10 kg were prepared by mixing OFMSW, SS and MC in three different ratios (w/w) [OFMSW: SS: MC= 3:1:1, 3:2:1, and 3:3:1]. Results showed that the pile [3:1:1] was most beneficial to composting. The final compost products contained a
... Show MoreThe need for participants’ performance assessments in academia and industry has been a growing concern. It has attendance, among other metrics, is a key factor in engendering a holistic approach to decision-making. For institutions or organizations where managing people is an important yet challenging task, attendance tracking and management could be employed to improve this seemingly time-consuming process while keeping an accurate attendance record. The manual/quasi-analog approach of taking attendance in some institutions could be unreliable and inefficient, leading to inaccurate computation of attendance rates and data loss. This work, therefore, proposes a system that employs embedded technology and a biometric/ w
... Show More