Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has been utilized to examine the foremost group of risk factors by Mean Score Technique (MS) and ranking from top to bottom. The risk factors of tendering phase analysis by using relative Importance Index (RII) method then ranking from top to bottom using their values. Consequences of this research article assessed that the technical criterion is the most efficient criteria at last, management criteria with all risk factors that showed in this research will be considered.
The researcher wanted to make an attempt to identify the foundations of social solidarity, to strengthen the bonds of brotherhood among society, and spread the causes of compassion in the hearts of its members.
The researcher has taken a short course in the hearts of the beloved to hearts.
This study aimed to developing the skills of critical reading for the tenth basic school female students through a training program using the reflective thinking method. The study sample consisted of (64) students. To achieve the objective of the study, the researcher uses the quasi-experiment approach consisting of a control group (32 students) and an experimental group (32 students). The researcher used three research inventories as follows: 1) A list of critical reading skills included (30) skills within three aspects (Recognition – Deduction – Evaluation and Judgment). 2) An executive program using reflective thinking for developing critical reading skills. 3) Achievement test to measure
... Show More
This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.
This search is field research, which aims to explore the trends of students in media department toward specialized Satellite Channels and identify the knowledge capacity and its role in the development of their knowledge’s, represented by watching those channels as well as media students' habits exposed by those channels. As to the public is a key element in the process and substantive communication, the Sociological studies information on that article information is not complete its work, but that he was receiving from before receiving, and send every piece of information content in order to achieve a certain goal, therefore, is the future of receiving such information in order to achieve a particular goal, which is
... Show MoreThe quantum chromodynamics theory approach was taken to study the photonic emission from interaction of quark gluon at high at Bremsstrahlung processes. Strength coupling, quark charge 𝑒𝑞 , flavor number 𝑛𝐹 , thermal energy T of system, fugacity of gluon ƛ𝑔, fugacity of quark ƛ𝑞 , critical temperature 𝑇𝐶 and photons energy 𝐸 are taken to calculate photons rate via the quantum system. Photons emission rate studies and calculates via high energy 400MeV to 650 MeV using flavor number 3 and 7 for 𝑢̅𝑔 → 𝑑̅𝑔𝛾 and 𝑐𝑔 → 𝑠𝑔𝛾 systems at bremsstrahlung processes with critical temperature (𝑇𝑐 = 190 and 196) MeV with photons energy (1-10) GeV. The confinement and de-confineme
... Show MoreThe quantum chromodynamics theory approach was taken to study the photonic emission from interaction of quark gluon at high at Bremsstrahlung processes. Strength coupling, quark charge 𝑒𝑞 , flavor number 𝑛𝐹 , thermal energy T of system, fugacity of gluon ƛ𝑔, fugacity of quark ƛ𝑞 , critical temperature 𝑇𝐶 and photons energy 𝐸 are taken to calculate photons rate via the quantum system. Photons emission rate studies and calculates via high energy 400MeV to 650 MeV using flavor number 3 and 7 for 𝑢̅𝑔 → 𝑑̅𝑔𝛾 and 𝑐𝑔 → 𝑠𝑔𝛾 systems at bremsstrahlung processes with critical temperature (𝑇𝑐 = 190 and 196) MeV with photons energy (1-10) GeV. The confinement and de-confineme
... Show MoreAn expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show More