Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance. Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis. Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and two indices—one for actualizing metrological risk and another for its management—are assessed. Findings: We find the all dimensions of the six sigma projects implemented facilitate the correction and adaptation of the main tasks aimed at improving the measurement management system. Research, Practical & Social implications: a risk-based approach and the six sigma method are can enhance the measurement management system and collect feedback on its performance. Originality/value: The merge a risk-based approach and the six sigma method its usefulness as a methodological tool for enhancing measurement management has been demonstrated.
Geomorphology is concerned with the topographic units that make up the Earth's surface. These take many forms, such as mountains and rivers, and include many dangers such as landslides, landslides and erosion. Many studies appeared in this field to analyze its effects and risks resulting from it, including urban studies, to determine the trends of optimal urban expansion and its geomorphological interactions. The results showed that the city of Kut originated and expanded near the course of the Tigris River and its branches, and it suffers from unbalanced urban expansion, due to the high rate of population growth, and overcrowding in housing units with the growth of urban land uses in it, which prompted the city to extend horizontally and v
... Show MoreThis research aims to identify the impact of the selective model in acquiring the concepts of Kurdish grammar among female students in the eighth grade, and to achieve the goal of research, the researcher selected the experimental design with partial control and dimensional testing; the sample includes basic schools in the Chim district of Chamal/ Sulaymaniyah and randomly selected the basic school (Maha Bad) to be the field of application of the experiment and the random drawing method was chosen: two out of three sections and the number of students of the two sections is (75) students; section (C) represents the experimental group that studied the rules according to the selective model and its number is (37) students, while secti
... Show MoreObjective(s): To evaluate youth's health risk behaviors in Baghdad City and to determine the relationship between such behaviors and the youth's demographic characteristics of age, gender and grade. Methodology: A descriptive study, using the evaluation approach, is carried out to evaluate youth's health risk behaviors in Baghdad City for the period of January 26th 2016 to May 20th 2016. A non-probability "purposive" sample of (160) University students is selected for the purpose of the study from four groups of colleges (medical, engineering, sciences, and education) and it is equally distributed of
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef
... Show MoreObjectives: To determine the contributing risk factors to adult nephrolithiasis patients.
Methodology: A descriptive study was conducted to determine the contributing risk factors to
Adults nephrolithiasis starting from December 2007 to September 2008. A purposive "nonprobability"
sample of (100) patients with nephrolithiasis was selected of those who were
admitted to the hospitals, attending the Urology Consultation Clinic and Extracorporeal Shock
Wave Lithotripsy Department. The study instrument consists of two parts. The first part is
related to the patients' demographic variables and the second part is constructed to serve the
purpose of the study. The total number of items in the questionnaire was (85) ones.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More