Measurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance parameters (cost, schedule, quality, leadership, and change management). At the same time, most project control systems are currently applied through software like Primavera P6 or MS Project. These look at a project’s cost and schedule status by following the earned value analysis for finding the performance. Based on decision makers’ preferences, the analytic hierarchy process (AHP) may be used to arrive at the optimum conclusion. AHP approaches are discussed, including AHP, grey-AHP, fuzzy-AHP, and SFAHP weights comparison. Calculation results showed that the spherical fuzzy approach differs significantly from the other approaches where it considers the decision maker’s hesitation when making linguistic multicriteria decisions and then, as a result, recommends applying periodically for performance measurement. This model can be viewed as a valuable way to help the decision-making stakeholders in the construction sector do the best job about critical issues at a suitable time.
Deixes belong to the field of both semantics and pragmatics as they lie in the edge of these two fields. Pragmatically, they are concerned with the relationship between the structure of a language and the contexts. The present work aims at analyzing the use of deixes using Levinson’s (1983) and Yule's (1996) concept of deixes, where the latter maintained that the referents of the deixes cannot be realized apart from the context where they are used. He added that the contextual information of certain utterances involves information about the participants (the speaker and the addressee), the time and the place. Consequently, a qualitative- descriptive approach has been adopted to meet the objective of the study which reads, “exam
... Show MoreThe marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Determining risk indicators for dental implants is an essential strategy for preventing peri-implant diseases and effective diagnosis of dental implant success. To investigate the impact of certain potential factors on the osseointegrated dental implant. Eighty-four individuals were included in our study, 50 cases as a patient’s group and 34 participants as a control group. All cases were diagnosed based on certain criteria, 30 (60%) of patients had peri-implantitis, 20 (40%) with severe periimplantitis, 36(72%) were generalized, and 15 (30%) as localized peri-implantitis cases. The study has indicated that 44.7% of dental implants were in the anterior maxilla, followed by (27.3%) posterior maxilla, (17.4%) posterior mandible, and (10.4%)
... Show MoreIn a world of limited space, the owners are always surrounded by others next to them, and, consequently, there is hardly any activity which the owner may exercise on his land which would not affect the other owners. If he builds a building, that building may block the sun's rays or the air from the buildings next to it and owned by other people. And if he runs a business, the lands adjacent to that business may be overburdened with the accompanying noise or traffic. If oil is prospected in a land, the neighboring lands may be deprived of oil or their owners may be exposed to toxic fumes. Hence the importance of researching the intention of harming others, as it is one of the most important forms of abuse in the use of the right (especially
... Show MoreThe research aims to identify the role of strategic improvisation as an independent variable with its dimensions (Building the Solution, Intuition, Adaptation, and Spontaneity) and the Entrepreneurial Orientation as a dependent variable with its dimensions (Identifying Opportunities, Creativity, Adopting risk, and Vision). This research has been applied in the Rafidain Bank and its branches (Sunk, People, Al-Firdaws, and Alawiya); it used the questionnaire as a basic tool for collecting information. The sample was intentionality, which included all the heads of departments in the bank’s branches, which amounted to (33) workers, and data on the questionnaire paragraphs of 28 were processed using the SPSS V.23 and AMOS V.23). The most impor
... Show MoreThe research problem revolves around the Iraqi public's use of digital television and cinematic websites، and their importance to the academic study and society، as it examines the public's relationship with these websites، usage habits، and the reasons for their interaction with them. And for the prevalence of this phenomenon of use، it was necessary to address the intensity، intentionality، and timing of use to theoretically root the subject of the study، which is one of the modern studies in Iraq and the Arab world. The survey approach، where the research was based on the theory of uses and gratifications that confer positivity and activity on the mass media audience.
The researchers designed
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More