The study examines the root causes of delays that the project manager is unable to resolve or how the decision-maker can identify the best opportunities to get over these obstacles by considering the project constraints defined as the project triangle (cost, time, and quality) in post-disaster reconstruction projects to review the real challenges to overcome these obstacles. The methodology relied on the exploratory description and qualitative data examined. 43 valid questionnaires were distributed to qualified experienced engineers. A list of 49 factors causes was collected from previous international and local studies. A Relative Important Index (RII) is adapted to determine the level of importance of each sub-criterion in the four main criteria (scope, time, cost, and quality) to represent the causing changes in projects. The concluded 13 important factors represent the challenges faced by managers. This process requires active participation in the management role to overcome potential delays that face a great challenge and cause huge waves of displacement that affect the Iraqi economy and lead to social and environmental modifications. Reconstruction projects create jobs, improve the quality of life, and encourage people to return to their homes and rebuild their cities. So, unlocking local potential is the key to sustainable rebuilding in Iraq. Doi: 10.28991/CEJ-2023-09-09-05 Full Text: PDF
Background The appropriate disposal of medication is a well-recognized issue that has convened growing recognition in several contexts. Insufficient awareness relating to appropriate methods for the disposal of unneeded medicine may result in notable consequences. The current research was conducted among the public in Iraq with the aim of examining their knowledge, attitude, and practices regarding the proper disposal of unused and expired medicines. Methods The present study used an observational cross-sectional design that was community-based. The data were obtained from using an online questionnaire. The study sample included people of diverse genders, regardless of their race or occupational status. The study mandated that all pa
... Show MoreThis study aimed to explore the manufacture of high-fat pellets for obesity induction diets in male Wistar rats and determined its effect on lipid profiles and body mass index. It was an experimental laboratory method with a post-test randomized control group. Formulation of high-fat pellets (HFD) and physico-chemical characteristics of pellets were conducted in September 2019. This study used about 28 male Wistar white rats, two months old, and 150-200 g body weight. Rats were acclimatized for seven days, then divided into four groups: 7 rats were given a standard feed of Confeed PARS CP594 (P0), and three groups (P1, P2, P3) were given high-fat feed (HFD FII) 30 g/head/day. The result showed that the mean fat content of Formula II pell
... Show MoreThe research included preparation of new Schiff base (L) by two steps: preparation of precursor [bis(2-formyl-6-methoxyphenyl) succinate] (P) by reacting (3-methoxy salicyl aldehyde) with (succinoyl dichloride) as first step then react the prepared precursor (P) with (ethanethioamide) to have the new Schiff base [bis(2-((ethane thioyl imino) methyl)-6-methoxy phenyl) succinate] (L) as second step. Characterized compounds based on Mass spectra, 1 H, 13CNMR (for ligand (L)), FT-IR and UV spectrum, melting point, molar conduct, %C, %H, and %N, the percentage of the metal in complexes %M, magnetic susceptibility, while study corrosion inhibition (mild steel) in acid solution by weight loss. These measurements proved that by (Oxygen, Nitrogen, a
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreWill address this research interaction and coordination between fiscal and monetary policies and the impact of this interaction and coordination on economic stability and growth، and how the financial implications of monetary policy may stimulate action monetary policy and treatment side effects and the nature of responsiveness and bounce between procedures both two policies and their impact on the balance of overall economic and explained in the folds of searchjustifications coordination and the extent necessary in order to address the imbalances in economic activity through twinning actions of monetary and fiscal، has embodied this coordination and interaction between policies and their impact m
... Show MoreIn this work, the calculation of matter density distributions, elastic charge form factors and size radii for halo 11Be, 19C and 11Li nuclei are calculated. Each nuclide under study are divided into two parts; one for core part and the second for halo part. The core part are studied using harmonic-oscillator radial wave functions, while the halo part are studied using the radial wave functions of Woods-Saxon potential. A very good agreement are obtained with experimental data for matter density distributions and available size radii. Besides, the quadrupole moment for 11Li are generated.
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show More