Preferred Language
Articles
/
WRYwSYcBVTCNdQwCTUJb
A spherical fuzzy AHP model for contractor assessment during project life cycle
...Show More Authors
Abstract<p>Measurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance parameters (cost, schedule, quality, leadership, and change management). At the same time, most project control systems are currently applied through software like Primavera P6 or MS Project. These look at a project’s cost and schedule status by following the earned value analysis for finding the performance. Based on decision makers’ preferences, the analytic hierarchy process (AHP) may be used to arrive at the optimum conclusion. AHP approaches are discussed, including AHP, grey-AHP, fuzzy-AHP, and SFAHP weights comparison. Calculation results showed that the spherical fuzzy approach differs significantly from the other approaches where it considers the decision maker’s hesitation when making linguistic multicriteria decisions and then, as a result, recommends applying periodically for performance measurement. This model can be viewed as a valuable way to help the decision-making stakeholders in the construction sector do the best job about critical issues at a suitable time.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Aug 15 2021
Journal Name
Annals Of R.s.c.b.
Versatile Applications of Complexes with Some Lanthanide Elements: A Review
...Show More Authors

Cerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi

... Show More
Publication Date
Sat Mar 01 2008
Journal Name
Iraqi Journal Of Physics
The Temperature Dependence of Photoconductivity in a-Ge20Se80 Thin Films
...Show More Authors

The photoconductivity and its dependence on light intensity have been investigated in a-Ge20Se80 thin films as a function of temperature between (293–323)K. The result showed that the photoconductivity and photosensitivity increase with increase of annealing temperature. This behavior is interpreted in terms of the dispersive diffusion –controlled recombination of localized electrons and holes.

View Publication
Publication Date
Wed Dec 14 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragma-Stylistic Study of Misdirection in Selected Detective Novels
...Show More Authors

The analysis of detective novels has taken different aspects. The linguistic analysis of them, for example, has tackled the linguistic systems of morphology, phonology, syntax, semantics, and pragmatics. In line with the linguistic analysis, this study explores the various pragmatic and stylistic devices realized through detective novels for the purpose of misdirecting and deceiving the reader. The problem is that when readers try to reach to the truth, they face difficulties. They might not reach to the right solution or infer wrong conclusions because writers use some techniques to hide the truth and mislead them. This study aims at examining these techniques and devices; namely, Grice's Maxims and ambiguity as pragmatic devices on the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 21 2025
Journal Name
Iklil For Human Studies
Review Article A Feminist Gothic in the American Literary Fiction
...Show More Authors

Teresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce

... Show More
Preview PDF
Publication Date
Fri Mar 30 2018
Journal Name
International Journal Of Multimedia And Image Processing
The Design of a Multimedia-Forensic Analysis Tool (M-FAT)
...Show More Authors

Digital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Oct 02 2024
Journal Name
Translation&linguistics
Verbal forms in French and Iraqi Arabic: a contrastive study
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Aug 31 2022
Journal Name
Al-kindy College Medical Journal
A Population based Study on Self Medication Practice in Pakistan
...Show More Authors

Background: The risk of antibiotics resistance (AR) increases due to excessive of antibiotics either by health care provider or by the patients.

Objective: The assessment of the self-medication Practice of over the counter drugs and other prescription drugs and its associated risk factor.

Subjects and Methods: Study design: A descriptive study was conducted from “20th December 2019 to 08th January 2021”. A pre validated and structured questionnaire in English and Urdu language was created to avoid language barrier including personal detail, reasons and source and knowledge about over the counter drugs and Antibiotics. Sample of the study was randomly selected.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference On Scientific Research &amp; Innovation (icsri 2022)
Saccharomyces Cerevisiae as a human pathogen in renal transplant recipients
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Plant Archive
A new species of genus stachys L. (Lamiaceae) in Iraq
...Show More Authors

Scopus (1)
Scopus