This study discusses risk management strategies caused by pandemic-related (Covid-19) suspensions in thirty-six engineering projects of different types and sizes selected from countries in the middle east and especially Iraq. The primary data collection method was a survey and questionnaire completed by selected project crew and laborers. Data were processed using Microsoft Excel to construct models to help decision-makers find solutions to the scheduling problems that may be expected to occur during a pandemic. A theoretical and practical concept for project risk management that addresses a range of global and local issues that affect schedule and cost is presented and results indicate that the most significant delays are due to a lack of good project risk management skills and remote project management capability which is exacerbated by shortfalls in technical development and information technology.
A prey-predator interaction model has been suggested in which the population of a predator consists of a two-stage structure. Modified Holling's disk equation is used to describe the consumption of the prey so that it involves the additional source of food for the predator. The fear function is imposed on prey. It is supposed that the prey exhibits anti-predator behavior and may kill the adult predator due to their struggle against predation. The proposed model is investigated for existence, uniqueness, and boundedness. After determining all feasible equilibrium points, the local stability analyses are performed. In addition, global stability analyses for this model using the Lyapunov method are investigated. The chance of occurrence of loc
... Show MoreThe different crises and financial collapses place in many companies, particularly in developed countries as a result of administrative and financial corruption return aspects of the task to the role of the company and the external auditor, both in their emphasis on honesty and fairness of financial statements and the Provisions of accounting information and on the contrary to the truth, you may have to the loss of the rights of stakeholders, particularly existing investors, and the loss of confidence of prospective investors in the accounting information contained in the financial statements of these companies, which led to a crisis of confidence and credibility in the profession of accounting and auditing where the wonder of ma
... Show MoreBackground: There is a clear debate about the role of bad oral habits (thumb-sucking and biting nails) and on oral health and the state of the dental caries, but there is no doubt that continuing these bad habits until advanced ages will lead to deep and difficult problems to solve. Objective: The purpose of study was to evaluate the effect of bad habits, include finger sucking and nail biting on dental caries among children aged from 6 to 10 years old. Subjects and methods: In Al-Hilla city, Iraq, a comparative study was conducted in which (200) primary school students aged between 6 to10 years old were involved. A questionnaire filled out by their parents was used to gather information related to the bad oral habit, and then all the stude
... Show MoreSocial responsibility has achieved tremendous attention by academicians and practitioners to focus on social responsibility accounting. However, many studies around the globe have been conduct to measure the outcomes of social responsibility accounting. This paper presents the impact of applying the supply chain strategy (SCS) on the agribusiness field to optimize productivity and decreasing cost which will have a direct impact on the net income of the organization. The inconclusive results of earlier studies stimulated this research to social responsibility accounting-financial performance. The equivocal results of this phenomenon urge this study to investigate the role of other factors in the relationship of social responsibility accounti
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreFor the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreIn recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configur
... Show MoreThe study aimed to identify the reality of the application of the organizational equity empowerment at the Jordanian government institutions from the viewpoint of women employees in terms of each of the (delegation equity, training equity, appraisal equity, join in committees equity, participation in decision-making equity), and the impact of non-application of equity empowerment on performance.
Population of the study amounted (986) women employee, while the researcher distributed (340) questionnaire through a randomly sample method.
The study used the questionnaire as a tool to collect the data. And to ensure the reliability of the questionnaire has been calculated Cronbach's co
... Show MoreThis research is aiming to analyze the impacts of the current budget in Iraq by using the Government Finance Statistics Manual (GFSM) , the research is based on hypothesis: (There is an impact on the using of the Government Finance Statistics Manual (GFSM) In public budget in Iraq) .This hypothesis was demonstrated by using the questionnaire, a number of conclusions were reached, the most important being the lack of terminology adopted in the government accounting system and the Iraqi financial and accounting manual as a result of their adoption of the monetary basis for the lack of accounting terminology that meets t
... Show More