The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of a construction project, this study constructed the matrix of probability and impact variables and put the periods based on the risk score. Finally, this study identified a fourth main risk group and twenty-two sub-risk factors that are appropriate for the tendering phase of construction projects in Iraq
The curriculum is considered one of the most important corners for the educational process, it participates in achieving the educational equilibrium between its elements.
The curriculum of (History of the Art) in the college of Art Education / dept. of plastic art education and ceramic as the other curriculums and due to the subject of history of the art develop the knowledge, taste and experiment for art studier also this subject has a direct relation with practical educational activities like colors and growth the knowledge of the student in field of contents and symbols and evidences of meaning in old , medium and contemporary arts, due to the fact that this curriculum has been applied since long time more than four years, and
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreIn the name of God the Merciful
Praise be to God and the Hall and Peace Uncle Prophet Muhammad and blindness Alo and companions
Money is the lifeblood and a reason for living. An individual cannot live without money to make it
It is only through the necessities of life and the state that it can perform its duties and functions only
As money is so important, the state must regulate the balance of revenues
And expenses in order to avoid failure in Mizanitia, but perhaps the country may be exposed to crises
An exception that leads to misappropriation in the general Mizanitia and the Islamic Shari'ah is valid for Makkah
Time and place for all circumstances has created several ways to address the budget defici
Subjected Find winged bull Assyrian monetary analysis in order to identify the formative relations in terms of percentages, movement and public swab for being aesthetic values upon which the mechanisms of artistic composition, which did not give researchers artistic interest that affects the status of these sculptures and the like of the achievements of the Iraqi civilization in Assyria.
Resulting analysis to a number of the most important results, the percentages approved in the calculation of the parts to do with all when viewed status horizontal with a realistic formulas while in the case of considering frontally clear for Ras stylized proportions and head size larger in length, a ratio confirmed by previous studies, and
... Show MoreThe graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ
... Show MoreBackground: This study is to evaluate the necessity of prescribing prophylactic antibiotics for nasal packing in spontaneous epistaxis. There are few published papers of infective complications in such patients.
Methods: This prospective study analysed 149 consecutive patients admitted to AL-Kindy teaching hospital with spontaneous, epistaxis, who underwent nasal packing over 2 years period . in the first year, 78 patients received prophylactic antibiotics , In the second year 71 patients were not given prophylatic antibiotics. Exclusion criteria included antibiotics prescribed for unrelated pathology and post-operative epistaxis. Signs and symptoms of acute otitis m
... Show MoreThe theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show More
