In this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive measures to prevent threats from resulting in corruption and were examined for each threat.
In this paper, I highlight the bishops mentioned in the Bible in its sections
(The Old and New Testaments) where these books still retain the remaining remnant of the Bible
Issuing the prophets who preceded the mission of the Prophet Muhammad (peace and blessings of Allaah be upon him) and they must pray
And peace, as those bishops were mentioned in the Book of Formation through the recitation of the psalms
To Habakkuk, Malakhi, and Hajji.
As well as in the New Testament, which we see clearly in the four Angels: Matthew, Luke,
Disco, John.
Then the male lamented what was said of those bishops by expressing the eternal heavenly book (the Qur'an)
Al - Karim) as he focuses on this subject from multiple angles and exp
The study focused on the results of first paleostress from thrust fault slip data on Tertiary age of Hemrin North Structure, North of Iraq. The stress inversion was performed for fault slip data using an improved right dihedral model, and then followed by rotational optimization (Georient Software). The trend of the principal stress axes (σ1, σ2 and σ3) and the ratio of the principal stress differences (R) show the main paleostress field is NE-SW compression regime. As well as using Lisle graph and Mohr diagram to determine the magnitudes of palestress. The values paleostress of the study area were σ1=1430 bars, σ2=632 bars and σ3=166 bar. The large magnitudes of the primary stress axes could be attributed to active tecto
... Show MoreThe aim of the research is a techno-economic analysis of the use of concentrated solar energy technologies in the Iraqi city, considering the concentrated solar energy technology is a renewable energy technology that derives its resources from the sun and is replenished at a rate that exceeds its use. It is also inexhaustible and environmentally friendly energy from its environmental footprint, unlike traditional fossil energy which produces greenhouse gases and a major cause of global warming.
This research measures the costs of concentrated solar energy technology to Reduce the effects caused by other energies and work to fill part of the shortfall in the total electricity production, even at a specific percentage, in preparati
... Show MoreThis paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio
Cloud storage provides scalable and low cost resources featuring economies of scale based on cross-user architecture. As the amount of data outsourced grows explosively, data deduplication, a technique that eliminates data redundancy, becomes essential. The most important cloud service is data storage. In order to protect the privacy of data owner, data are stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for data storage. Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness. This paper proposes a combined compressive sensing and video deduplication to maximize
... Show MoreThe general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe
... Show MoreThis research deals with the use of a number of statistical methods, such as the kernel method, watershed, histogram, and cubic spline, to improve the contrast of digital images. The results obtained according to the RSME and NCC standards have proven that the spline method is the most accurate in the results compared to other statistical methods.