Purpose: aims the study to show How to be can to enhance measurement management by incorporating a risk-based approach and the six sigma method into a more thorough assessment of metrological performance. Theoretical framework: Recent literature has recorded good results in analyzing the impact of Six Sigma and risk management on the energy sector (Barrera García et al., 2022) (D'Emilia et al. 2015). However, this research came to validate and emphasize the most comprehensive assessment of metrological performance by integrating Risk management based approach and Six Sigma analysis. Design/methodology/approach: This study was conducted in Iraqi petroleum refining companies. System quality is measured in terms of sigmas, and two indices—one for actualizing metrological risk and another for its management—are assessed. Findings: We find the all dimensions of the six sigma projects implemented facilitate the correction and adaptation of the main tasks aimed at improving the measurement management system. Research, Practical & Social implications: a risk-based approach and the six sigma method are can enhance the measurement management system and collect feedback on its performance. Originality/value: The merge a risk-based approach and the six sigma method its usefulness as a methodological tool for enhancing measurement management has been demonstrated.
In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical
... Show MoreVol. 6, Issue 1 (2025)
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreFor the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.
Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreUnderstanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.
The ability of single and mixed bacterial culture to utilize Dora-refineries petroleum wastes was compared. Pseudomonas aeruginosa and Serratia ficaria mixed culture consumed the wastes better than the single bacterial cultures. The highest log. number of viable cells in mixed culture was 6.842 , while in single bacterial cultures it was 6.683 and 5.631, respectively. after 3 days in API medium containing the refinery wastes. The effect of some environmental conditions on the degradation of petroleum wastes was studied included aeration , NaCl concentration , pH and temperature. The growth of bacteria in the agitated culture was higher than stagnant culture the log. of cell no. was 6.021 in the first culture. The h
... Show MoreAfield experiment was conducted in the college of Agriculture labs Sulaimanya University in 2014 to estimate the genetic variance between 12 genotypes of maize. (SSR) technology was used depending on (PCR) technology. Twenty primers were used for the genetic variance analysis between the studied genotypes and 15 primers showed polymorphic results in repeated experiment caused to experinse 52 alleles which gave 307 bands of range 3.1 by different molecular sizes ranged between 80-1000 pair base the value of PIC reached to phi069 gave high value (0.8785), the range of genetic diversity for studied genotypes reached to (0.625) gave primers pairs phi069 hig value for genetic diversity (0.888). The value of total allele replication ranged at pri
... Show MoreIslamic law has relied on a number of sources in order to denote the rulings issued by them, including what is original and what is sub, and it is known to all scholars, that the Prophet's Sunnah is the second major source after the Koran, which separated the overall and devoted its year and restricted absolute. God Almighty obeyed the owner and his followers, and that his obedience of obedience to God Almighty said: (Who obeys the messenger has obeyed God) (women: 80), and then between the peasant who believes in him and his victory and follow him, he said: (and he said: And the one who was revealed with them were the successful ones (al-A'raf: 157).
It is known that the Sunnah commanded to follow is the