Construction projects have a special nature and affect them many factors making them exposed to multiple risks as a result of the length of the implementation period and the multiplicity of stages, starting from the decision stage through implementation until the final delivery, which leads to increased uncertainty and the likelihood of risk.
The process of analysis and risk management is one of the effective and productive methods that are used in managing the construction projects for the purpose of increasing the chances of ending the project successfully in terms of cost, time and quality and at the lowest possible problems.
The research aims first to the effective planning for analysis and risk managemen
... Show MoreYersinia enterocolitica has ranked a third among the pathogens that most frequently cause gastrointestinal disorders transmitted to humans through food materials, especially contaminated meats. The meat infected with Yersinia enterocolitica had no change in apparent texture or smell. The aim of this research is to survey the frequency of Y. enterocolitica in ovine meat, compare their ratio of infection between the season, To carry out this study (125) samples of local ovine meat were collected by random sampling from the middle region of Iraq. The samples were divided into two groups steak and mince, then many microbiological tests (culture, & staining, biochemical Tests Api 20E, Vitik 2 and species-specific PCR amplicon for 16S RNA gene) w
... Show MoreThe system of accounting information role in the success of the economic unit, whether for-profit or non-purposeful, and through the availability of financial reports of information accounting for quality properties in the financial reports, which are the final product of all departments, sections and other parties, including help in strengthen the decisions of the administration and operations of Information economic Unity. The municipalities of economic units, non-profit, which is characterized by certain characteristics, including the multiplicity of activities (service, productivity, construction) and multiple sources of access to resources, so the accounting information system that seeks to provide decision makers with information o
... Show MoreObjective: To assess the effect of six-minute walk test on health-related quality of life in patients undergone coronary artery bypass graft surgery at Iraqi center for heart diseases. Material: This descriptive study was conducted from 8th August, 2022 to 10th January, 2023. A non-probability purposive sample of 50 patients undergoing coronary artery bypass graft surgery at Iraqi center for heart diseases was included in the study. A questionnaire composed of three parts; sociodemographic and clinical data, six-minute walk test (6MWT) and health-related quality of life (HRQoL) were used. SPSS version 26 was utilized to analyze data. Results: Patient’s performance showed highly significant statistical differences at p<0.05 betw
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreIn these recent years, the world has witnessed a kind of social exclusion and the inability to communicate directly due to the Corona Virus Covid 19 (COVID-19) pandemic, and the consequent difficulty of communicating with patients with hospitals led to the need to use modern technology to solve and facilitate the problem of people communicating with each other. healthcare has made many remarkable developments through the Internet of things (IOT) and cloud computing to monitor real-time patients' data, which has enabled many patients' lives to be saved. this paper presents the design and implementation of a Private Backend Server Software based on an IoT health monitoring system concerned emergency medical services utilizing biosenso
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show More