The research aims to identify the risks faced by projects and work on the administration, such as those risks by using professional Project Management System (Project Management Professional) by identifying those risks and their impact on the objectives of the project, if they occur and to provide appropriate responses to Ha.autam search application on the draft Law Faculty port by the General Mansour Construction Contracting company has been using a method personal interview with the heads of departments and project managers in the Al-Mansour and tools descriptive and quantitative analysis as was used (likelihood and impact of risk analysis, Ai_kaoa scheme Sbb- effect, analysis of probability and impact, risk matrix (probability
... Show MoreThe study aims to identify the third instar larvae of fly species (Order : Diptera) feeding on carcasses (Fishes and Rabbits). Two families (Calliphoridae and Sarcophagidae), were recorded with highest rate in Calliphoridae species. The following species had been registered in accordance with their prevalence respectively; Calliphora vicina Rob.-Desvoidy, Chrysomya albiceps (Wiedmann), Chrysomy megacephala (Fabricius), Sarcophaga sp. and Lucilia sericata (Meigen). The highest rate has been registered Calliphora vicina during February, November, December and January at rate 100%, the larvae of this fly have not been observed during July, August, September and October. The highest rate of Ch
... Show MoreThe work was carried out in two stages. The first stage concerned
with study of silicon carbide (SiC) ratio (1.5, 2.5, 3.5, and 4.5 wt%)
effect on the Thermal conductivity of polyvinyl chloride (PVC); and
the second stage concerned with the UV – weatherizing (25, 50, and
75 hr), thermal aging (40, 50, and 60 °C), and rain- weatherizing (1,
2.5, and 4 hr) effect on the samples involved. Thermal conductivity
results proved that there was slight increase in thermal conductivity
by (SiC) loading; it increased from 0.17 W/m.K for PVC to 0.19
W/m.K for 4.5% SiC/PVC; where as it was systematically decreased
by UV- weatherizing, thermal aging, and rain- weatherizing. This
property is in a good agreement with gene
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreRecently, the increasing demand to transfer data through the Internet has pushed the Internet infrastructure to the nal edge of the ability of these networks. This high demand causes a deciency of rapid response to emergencies and disasters to control or reduce the devastating effects of these disasters. As one of the main cornerstones to address the data trafc forwarding issue, the Internet networks need to impose the highest priority on the special networks: Security, Health, and Emergency (SHE) data trafc. These networks work in closed and private domains to serve a group of users for specic tasks. Our novel proposed network ow priority management based on ML and SDN fullls high control to give the required ow priority to SHE dat
... Show More