The process of risk assessment in the build-operate transfer (BOT) project is very important to identify and analyze the risks in order to make the appropriate decision to respond to them. In this paper, AHP Technique was used to make the appropriate decision regarding response to the most prominent risks that were generated in BOT projects, which includes a comparison between the criteria for each risk as well as the available alternatives and by mathematical methods using matrices to reach an appropriate decision to respond to each risk.Ten common risks in BOT contracts are adopted for analysis in this paper, which is grouped into six main risk headings.The procedures followed in this paper are the questionnaire method to assign the weights of each criterion and each alternative based on the evaluations of 10 experts in BOT contracts after building the questionnaire model.The appropriate decision was reached to respond to each risk, and then the best measures taken were made based on literature reviews of previous research regarding the procedures for risk response plans.
Spatial data observed on a group of areal units is common in scientific applications. The usual hierarchical approach for modeling this kind of dataset is to introduce a spatial random effect with an autoregressive prior. However, the usual Markov chain Monte Carlo scheme for this hierarchical framework requires the spatial effects to be sampled from their full conditional posteriors one-by-one resulting in poor mixing. More importantly, it makes the model computationally inefficient for datasets with large number of units. In this article, we propose a Bayesian approach that uses the spectral structure of the adjacency to construct a low-rank expansion for modeling spatial dependence. We propose a pair of computationally efficient estimati
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThe aim of this paper is to present the numerical method for solving linear system of Fredholm integral equations, based on the Haar wavelet approach. Many test problems, for which the exact solution is known, are considered. Compare the results of suggested method with the results of another method (Trapezoidal method). Algorithm and program is written by Matlab vergion 7.
In this work, the fractional damped Burger's equation (FDBE) formula = 0,
In this paper, the ability of using corn leaves as low-cost natural biowaste adsorbent material for the removal of Indigo Carmen (IC) dye was studied. Batch mode system was used to study several parameters such as, contact time (4 days), concentration of dye (10-50) ppm, adsorbent dosage (0.05-0.25) gram, pH (2-12) and temperature (30-60) oC. The corn leaf was characterized by Fourier-transform infrared spectroscopy device before and after the adsorption process of the IC dye and scanning electron microscope device was used to find the morphology of the adsorbent material. The experimental data was imputing with several isotherms where it fits with Freundlich (R2 = 0.9
... Show MoreAbstract: Stars whose initial masses are between (0.89 - 8.0) M☉ go through an Asymptotic Giant Branch (AGB) phase at the end of their life. Which have been evolved from the main sequence phase through Asymptotic Giant Branch (AGB). The calculations were done by adopted Synthetic Model showed the following results: 1- Mass loss on the AGB phase consists of two phases for period (P <500) days and for (P>500) days; 2- the mass loss rate exponentially increases with the pulsation periods; 3- The expansion velocity VAGB for our stars are calculated according to the three assumptions; 4- the terminal velocity depends on several factors likes metallicity and luminosity. The calculations indicated that a super wind phase (S.W) developed on the A
... Show MoreThe research aims to find out the impact of cognitive strategies in the mathematical competence of the students of the fourth scientific in the preparatory mahmoudiyah in the Directorate General of The Education of Karkh 2. A post-test of the mathematical competence prepared by (Jassim, 2018) was applied to the sample of (65) students, distributed into two groups of (33) students as experimental group and (32) students as a control group. The results found there are significant differences between the experimental group and the control group in testing the mathematical competence of students for the experimental group.