The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main method which is used to resolve the claims in the construction project in Iraq. Finally, the proposed claims management system is developed to control the causes of the claims during the preconstruction phase and construction phase.
Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe research aims to diagnose the shortcomings and weaknesses in applying the dimensions of the quality of work life and the extent of their impact on employees’ attitudes and behaviors, and thus their relationship to enhancing their core competencies. The scientific value of the research stems from highlighting the importance of the dimensions of the quality of professional life in improving the productive efficiency of workers in the public sector and raising the level of organizational performance. Because the quality of working life plays an important role in enhancing the core competencies of employees in the public sector, it can also be an incentive or a disincentive for any employee by adapting to the economic and social condit
... Show MoreIn this research, a simple experiment in the field of agriculture was studied, in terms of the effect of out-of-control noise as a result of several reasons, including the effect of environmental conditions on the observations of agricultural experiments, through the use of Discrete Wavelet transformation, specifically (The Coiflets transform of wavelength 1 to 2 and the Daubechies transform of wavelength 2 To 3) based on two levels of transform (J-4) and (J-5), and applying the hard threshold rules, soft and non-negative, and comparing the wavelet transformation methods using real data for an experiment with a size of 26 observations. The application was carried out through a program in the language of MATLAB. The researcher concluded that
... Show More That it is essential to be for us to recognize is that the phenomenon of poverty are addressed most of the doors of Arab countries in general and Iraq in particular, with the contrast between Qatar and another, and that the deteriorating situation of developing countries it is clear that poor people are victims of exploitation and inequality.
That dealing with the phenomenon of poverty should be more present in mind, especially since the Arab world that enters the era of so-called globalization, as more people poor, and the increase of the utilization of materials Arab interests abroad under the competition is unequal and the impoverishment of deliberate environmental and resource Arab