The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method to assign the weights of each criterion and each alternative based on the evaluations of 10 experts in BOT contracts after building the questionnaire model.The appropriate decision was reached to respond to each risk, and then the best measures taken were made based on literature reviews of previous research regarding the procedures for risk response plans.
Background: In the past, an association between Tuberculosis (TB) and Diabetes Mellitus (DM) was widely accepted, today the potential public health and clinical importance of this relationship seems to be largely ignored. The national clinical and policy guidance in the UK on the central of TB, for example, does not consider the relationship with DM.Objectives: To determine the risk of association between diabetes mellitus and pulmonary TB.Methods: A retrospective study conducted in Ibn Zuhr hospital for chest diseases from Jan 2008 – sep 2010 , included in the study 402 patients with TB divided into diabetic & non diabetic, 96 (23.8%) were diabetic while other 306 were TB not diabetic.Results: Risk of TB among DM patients were cle
... Show MoreOxidation of sulfur compounds in fuel followed by an adsorption process were studied using two modes of operation, batch mode and continuous mode (fixed bed). In batch experiment oxidation process of kerosene with sulfur content 2360 ppm was achieved to study the effect of amount of hydrogen peroxide(2.5, 4, 6 and 10) ml at different temperature(40, 60 and 70)°C. Also the effect of amount acetic acid was studied at the optimal conditions of the oxidation step(4ml H2O2 and 60 °C).Besides, the role of acetic acid different temperatures(40, 60, 70) °C and 4ml H2O2, effect of reaction time(5, 30, 60, 120, 300) minutes at temperatures(40,60) °C, 4ml H2O2 and 1 mlHAC)&
... Show MorePorosity plays an essential role in petroleum engineering. It controls fluid storage in aquifers, connectivity of the pore structure control fluid flow through reservoir formations. To quantify the relationships between porosity, storage, transport and rock properties, however, the pore structure must be measured and quantitatively described. Porosity estimation of digital image utilizing image processing essential for the reservoir rock analysis since the sample 2D porosity briefly described. The regular procedure utilizes the binarization process, which uses the pixel value threshold to convert the color and grayscale images to binary images. The idea is to accommodate the blue regions entirely with pores and transform it to white in r
... Show MorePure SnSe thin film and doped with S at different percentage (0,3,5,7)% were deposited from alloy by thermal evaporation technique on glass substrate at room temperature with 400±20nm thickness .The influences of S dopant ratio on characterization of SnSe thin film Nano crystalline was investigated by using Atomic force microscopy(AFM), X-ray diffraction (XRD), energy dispersive spectroscopy (EDS), Hall Effect measurement, UV-Vis absorption spectroscopy to study morphological, structural, electrical and optical properties respectively .The XRD showed that all the films have polycrystalline in nature with orthorhombic structure, with preferred orientation along (111)plane .These films was manufactured of very fine crystalline size in the ra
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreAbstract
The Phenomenon of Extremism of Values (Maximum or Rare Value) an important phenomenon is the use of two techniques of sampling techniques to deal with this Extremism: the technique of the peak sample and the maximum annual sampling technique (AM) (Extreme values, Gumbel) for sample (AM) and (general Pareto, exponential) distribution of the POT sample. The cross-entropy algorithm was applied in two of its methods to the first estimate using the statistical order and the second using the statistical order and likelihood ratio. The third method is proposed by the researcher. The MSE comparison coefficient of the estimated parameters and the probability density function for each of the distributions were
... Show More