The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method to assign the weights of each criterion and each alternative based on the evaluations of 10 experts in BOT contracts after building the questionnaire model.The appropriate decision was reached to respond to each risk, and then the best measures taken were made based on literature reviews of previous research regarding the procedures for risk response plans.
لمعرفة مدى تأثير تمرينات مهارية وفق تقنية تركيز للتفكير الجاني على الدقة الحركة وتعلم هجمة الإيقاف بالغطس للطلاب في سلاح الشيش استخدمت الباحثتان المنهج التجريبي على عينة من طلاب المرحلة الثالثة بكلية التربية البدنية وعلوم الرياضة –جامعة ديالى والتي بلغت (30) طالباً موزعين على مجموعتين التجريبية والضابطة وبعد إكمال اجراءات البحث وتطبيق الاختبارات القبلية وتنفيذ التمرينات والاختبار البعدي ومعالجة الب
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show More
The research aims to study the reliability of government institutions, including the audit directors, which are one of the most important oversight formations in the Ministry of Construction, Housing and Public Municipalities, on which the responsibility for comprehensive auditing of all the Ministry's (municipalities) formations falls on the Managing the Audit Program according to the specification (ISO 19011: 2018) to improve the audit performance which requires compliance with the application of the audit management system in accordance with the standard Specification (ISO 19011: 2018), depending on the methodology of the case study, and using of checklists, which were chosen ac
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreThis paper is concerned with introducing and studying the M-space by using the mixed degree systems which are the core concept in this paper. The necessary and sufficient condition for the equivalence of two reflexive M-spaces is super imposed. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are introduced. From an M-space, a unique supratopological space is introduced. Furthermore, the m-continuous (m-open and m-closed) functions are defined and the fundamental theorem of the m-continuity is provided. Finally, the m-homeomorphism is defined and some of its properties are investigated.
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion
Gypseous soil is prevalent in arid and semi-arid areas, is from collapsible soil, which contains the mineral gypsum, and has variable properties, including moisture-induced volume changes and solubility. Construction on these soils necessitates meticulous assessment and unique designs due to the possibility of foundation damage from soil collapse. The stability and durability of structures situated on gypseous soils necessitate close collaboration with specialists and careful, methodical preparation. It had not been done to find the pattern of failure in the micromechanical behavior of gypseous sandy soil through particle image velocity (PIV) analysis. This adopted recently in geotech