Preferred Language
Articles
/
joe-1749
Risk Response in Construction Project: A Review Study
...Show More Authors

Construction projects are characterized as projects with multi phases and activities, complex, unique, and have many different parties and stakeholders. Risks could appear at one or more of the construction project stages and may affect the achievement of project objectives. Therefore, one of the key elements in the planning phase of any project is the risk management process (RMP). This study attempts to understand the terminology of risk in general, risk management, and response to risk in particular. This study is mainly a review of thirty-eight studies that have been published between 1997 and 2020 that demonstrate the importance of the crucial phase of risk response from the risk management process and its impact on the project objectives, as well as the tools and methodologies that project managers and decision-makers could use to handle the risks to reduce the negative effects of risks on the success of the construction projects. This study concludes that risk response should be considered an essential activity to complete the RMP, which will lead to minimizing the losses due to risks, maximizing the benefits due to opportunities, and achieving the objectives of projects.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
The Journal Of Continuing Education In Nursing
Debate as a Teaching Strategy in Nursing
...Show More Authors

Debate is a teaching strategy in nursing education that enhances students' critical thinking. Although debate can be an effective teaching strategy, it is not without limitations. This article discusses the advantages and disadvantages of debate as a teaching strategy in nursing. Also, evaluating debates and choosing topics are highlighted. [ J Contin Educ Nurs . 2021;52(6):263–265.]

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Illocutionary Act in a Selected Presidential Speech on COVID-19
...Show More Authors

     This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak.  A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.

     What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Aug 26 2022
Journal Name
Surgical Neurology International
Excellent recovery after nonmissile penetrating traumatic brain injury in a child: A case report
...Show More Authors
Background:

Nonmissile penetrating traumatic brain injuries (pTBIs) are low-velocity injuries which can be caused by a variety of inflicting tools and represent a rare entity in children. Poor outcome has been attributed with an initial admission Glasgow Coma Scale (GCS) of <5, asymmetrical pupil size, and specific initial computed tomography scan findings including brainstem injury.

Case Description:

We report a case of an 11-year-old boy who presented to our ER with a GCS of 6 after being assaulted on his head by a 30 cm length metallic tent hook penetrating his forehead reaching down to the central skull bas

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
English Personal Pronouns as a Manipulation Strategy in Political Discourse: A Critical Discourse Analysis
...Show More Authors

Manipulation is a discursive concept which plays a key role in political discourse by which politicians can impose some impact on their recipients through using linguistic features, most prominent of which are personal pronouns (Van Dijk, 1995). The aim of this study is to investigate how politicians utilize the personal pronouns, namely; We and I and their possessive forms as a tool of manipulating the audience's mind based on Van Dijk's  "ideological square" which shows positive-self representation and negative-other representation (Van Dijk,1998:p.69). To this end, American President Donald Trump's 2020 State of the Union speech was chosen to be the data of analysis. Only (8)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Forecasting Credit Losses in A Sample of Iraqi Banks - A Comparative Analysis
...Show More Authors

  The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 14 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
10.28936 THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.: THe RELATIONSHIP BETWEEN TELEVISION ADVERTISING AND RANDOM BUYING FOR COSMETICS/ EXPLORATORY STUDY OF A SAMPLE OF WOMEN AT THE UNIVERSITY OF BAGHDAD.
...Show More Authors

This research deals with the relationship between television advertising and buying random cosmetics, where we find that TV ads influence on the purchasing behavior of women, has conducted research in the field on a sample of women in the University of Baghdad, was a random sample taken from 150 different women in the age and social levels educational and cultural students and employees and teachers in order to sample representative be for the research community, and designed a questionnaire for this purpose form as a tool to collect data and information search and analyzed they answered the sample surveyed using a statistical program (spss) to extract percentages And correlation coefficients and testing square Kay , The study found Of w

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 07 2022
Journal Name
مجلة الدراسات الاقتصادية والادارية
Measuring readiness to accomplish organizational change through personal characteristics: Crisis management approach: An exploratory study of the opinions of a sample of managers at Central Technical
...Show More Authors

The self-evident truth existing in today's business environment is the continuity of change and its continuity and turmoil, also its increase over time as it is more abundant, abundant, wide and complex than ever before, and it is the dominant feature in the business environment, as different organizations and operating units can find themselves shifting from the top to the bottom. And then it requires its departments to strive to adapt to these rapid and turbulent shifts and changes by bringing about a series of organizational and adaptive changes that are not limited to one organizational aspect only but rather include all organizational components. Accordingly, this research came to determine the readiness of public organizations to chan

... Show More
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Effects of Ho: YAG Laser (2100nm) in Prostate Tissue: An in vitro Study
...Show More Authors

Benign prostate hyperplasia (BPH), non-cancerous enlargement of prostate, is the most prevalent disease entity in elderly men. BPH affects 40% of men after the age of 60year worldwide. BPH causes problems for patients with significant lower urinary tract obstructive symptoms, if not responding to medical therapy, surgical intervention is instituted. One method of the treatment of symptomatic BPH is laser prostatectomy. The understanding of tissue effects by laser radiation is very important for the safe clinical application of laser. Objective: study the 2100 nm Ho: YAG laser gross tissue effects in the prostate at different laser dose settings in an vitro model prostate tissue samples harvested from same specimen of open surgery prostat

... Show More
View Publication Preview PDF