The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method to assign the weights of each criterion and each alternative based on the evaluations of 10 experts in BOT contracts after building the questionnaire model.The appropriate decision was reached to respond to each risk, and then the best measures taken were made based on literature reviews of previous research regarding the procedures for risk response plans.
Twenty-two of the Starling Sturnus vulgaris Linnaeus, 1758 were collected in Baghdad city during the period from January to September, 2014, and examined for endoparasites. Ten (45.45%) were found infected with either the cestode Passerilepis crenata (Goeze, 1782) (31.81%) or the nematode Dispharynx nasuta (Rudolphi, 1819) (13.63 %). Morphometric and meristic features for these worms were expressed. D. nasuta is recorded here for the first time from S. vulgaris for Iraq.
Inelastic magnetic electron scattering M1 at Ex =10.23 MeV form factors in Ca-48 have been investigated. The fp shell model space with four orbits and eight neutrons have been considered and FPD6 has been selected between 32 model space effective interactions to generates the model space vectors for the M1 transition with excitation energy Ex =10.23 MeV and for constructing OBDM. Discarded space (core and higher configuration orbits) has been included through the first order perturbation theory to couple the partice-hole pair of excitation in the calculation of the total M1 form factor and regarding the realistic interaction M3Y as a core polarization interaction with six sets of fitting parameters. Finally the theoretical calculations h
... Show MoreIntended for getting good estimates with more accurate results, we must choose the appropriate method of estimation. Most of the equations in classical methods are linear equations and finding analytical solutions to such equations is very difficult. Some estimators are inefficient because of problems in solving these equations. In this paper, we will estimate the survival function of censored data by using one of the most important artificial intelligence algorithms that is called the genetic algorithm to get optimal estimates for parameters Weibull distribution with two parameters. This leads to optimal estimates of the survival function. The genetic algorithm is employed in the method of moment, the least squares method and the weighted
... Show MoreThe study aimed to identify Human Papillomavirus (HPV) and its genotypes prevalent among Iraqi women. They collected 89 cervical swab samples from diagnosed patients at Baghdad Teaching Hospital's Early Detection Clinic. Using PCR technique on 19 samples, they found HPV16 (57.89%) and HPV6 (10.52%) genotypes, while HPV-11, 18, and 45 were absent. HPV 16 and HPV 6 were common in cervical cancer among Iraqi women. Sequencing revealed nucleic acid variants in HPV-6 (124A>C) and HPV-16 (225G>T) E6 genes, resulting in silent effects on the encoded protein. These changes didn't alter amino acid residues (p.74I= and p.L117=). Phylogenetic analysis showed substantial distances between their samples and other viral types, indicating di
... Show MoreThe slums one of the main problem plaguing the city of Baghdad in general and
the unity of municipality of New Baghdad, especially, where the characteristics of the study
area a prominent role in population growth and the emergence of slums where a private,
although the region suffer from the housing crisis is the lack of the number of housing units
compared to the number of families in which, With high land prices and the level of rent
which was accompanied by the absence of the law, which was followed by the year 2003, has
become the study area and one of the most municipalities of the city of Baghdad Contain
slums which took fills abandoned buildings and acquires vacant land agricultural ones and
allocated to d
Pemphigus vulgaris is an autoimmune disease of the skin and mucous membrane. Renal transplantation is a common procedure in
To study the frequency of skin tumors and infections in patients with pemphigus vulgaris compared with renal transplant recipients and normal controls.
One hundred kidney transplant recipients, their ages ranged from 14 to 70 (46.65 ± 4.74) years
In this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.