Construction is a complicated process that takes place in an almost uncontrollable environment. Although projects can be carefully planned in advance in principle, there is a chance that unforeseen events and crises can disrupt these plans, affecting project development. Because the initial investment expenditures in construction projects are so large, they may be quickly influenced by crises, resulting in significant financial losses. The 2014 financial crisis was one of the most prominent crises that Iraq faced, which significantly impacted various activities in general and the construction industry in particular. Despite the importance of crisis management systems, the researchers found a great lack of local studies looking at crisis management, specifically in the basic stages chosen for its development, which are before, during, and after a crisis. Therefore, an effective crisis management system has been developed consisting of 20 critical success factors with devising 59 actions that can be taken for each proposed criterion for each of the three stages of crisis.
Since its first description as a cytotoxic agent, Olea europaea leaves extract gained significant popularity against human breast cancer, ethyl acetate extract of Olea europaea leaves obtained by acid hydrolysis method was evaluated in vitro as cytotoxic agent against new human breast cancer (AMJ13) cell line, using the MTT assay. One main pentacyclic triterpenoid; oleanolic acid, was isolated from leaves of Olea europaea by well-known two different methods, but not used for this compound before, the acidic hydrolysis method and basic acidic method. The presence of oleanolic acid was proved in both methods with qualitative and quantitative d
... Show MoreRepresent choices Behaviorism available to the Managerial leaders one of the prerequisites to run any beginnings of a psychological or dilemmas Managerial barriers to working in the field of work has been varied these options until it had taken several kinds of which contributed to the left different impacts on the alleviation of these problems, which prompted the researcher to raising the problem of study within the framework of questionable content how to contribute to that shown by Choices Behaviorism accredited to the Managerial leaders in the management of frustration
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study was carried out in order to determine the toxic, mutagenic and antimutagenic effects for Mallow (Malva parviflora) in comparison to its mutagenic effect of Ultraviolet (UV) because it is consider physical mutagen by using parameters for the extract pri , with , post UV exposure by using bacterial system (G-system). The used system consisted of three isolates G3 Bacillus spp., G12 Arthrobacter spp. and G27 Brevibacterium spp.. The study depended on recording survival fraction (Sx) for studying the effects and induction of Streptomycin and Refampicin resistance mutants as a genetic markers.Water Extract was prepared from fresh and dry mallow leaves, stems, flowers and roots, in optimum concentration equal to (125µg/ml) which is
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreThe mechanism of the electronic flow rate at Al-TiO2 interfaces system has been studied using the postulate of electronic quantum theory. The different structural of two materials lead to suggestion the continuum energy level for Al metal and TiO2 semiconductor. The electronic flow rate at the Al-TiO2 complex has affected by transition energy, coupling strength and contact at the interface of two materials. The flow charge rate at Al-TiO2 is increased by increasing coupling strength and decreasing transition energy.
In this work, seven soil samples were brought brought to study and analyses the element concentrations from different southern regions of Iraq using laser-induced breakdown spectroscopy (LIBS) technique. It has been documented as an atomic emission spectroscopy (AES) technique. Laser-induced plasma utilized to analyze elements in materials (gases, liquids, and solids). In order to analyze elements in materials (gases, liquids, and solid). The Nd: YAG laser excitation source at 1064 nm with pulse width 9 ns is used to generate power density of 5.5 x 1012 MW/mm2, with optical spectrum in the range 320-740 nm. From this investigation, the soil sample analysis of the southern cities of Iraqi, it is concluded that the rich soil element of P, Si,
... Show MoreIn this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreIn this work, optical system with different aperture shapes (circular, square, elliptical and triangle aperture) has been used for efficiency evaluation when the system involved moving factor in ideal case (aberration free). The optical system evaluate far moving object, therefore the image forming at image plane due to point spread function (image formula of incoherently illuminated point object). A mathematical treatment has been used to getting results by Gaussian numerical calculations method. The results show priority of circular aperture when optical system that submits of moving factor.