This essay aims to highlight the most important issues and difficulties facing implementing large projects that follow the turn-key method, considered one of the types of contractual methods in Iraq, especially for large and complex projects requiring speedy completion. The projects implemented in this way face delays and delays in completion, which led to the lack of benefit from the projects for which they were implemented, especially those affecting the lives of citizens within the health sector. The case study dealt with the construction of hospitals with multi-bed capacities within multiple governorates in Iraq, With large financial allocations within the federal budget of the Government of Iraq over several years. After conducting a descriptive statistical analysis of the data obtained through a field survey and interviews with individuals working in the construction sector with experience in their field. The most important 10 factors were identified from a list of 51 delay factors (distributed according to the questionnaire forms) with a high RII. These factors were related to the delay in the payment of the contractor's dues, the delay in processing materials, the issuance of new instructions and regulations, the delay in obtaining official approvals from the relevant authorities, Errors in designs or contracting documents, lack of cooperation between the contracting parties, and multiple spare orders for reasons belonging to the employer. The article also included the most important suggestions that contribute to reducing the delay in completing projects.
The photonconductor detectors CdSe:Cu was fabricated as a thin film of (1 μm) in thickness using vacuum evaporation technique. doping with copper was made using vacuum annealing at 350oC under argon atmosphere . The spectral responsivity and spectral detectivity of the detector were determined as a function of incident wavelength on the sample. A remarkable improvement in performance was absorbed for the specimen, which doping with (1-5 wt%) Cu.
The spectral response increases with increasing of wavelength for incident radiation to maximum value, after that , it reduced sharply . There is a shifting for peak responsivity indirect of higher wavelength. The detectivity was increased with doping but its decreased as the concentration in
ABSTRACT Background: Dental anomalies of teeth are major issue that contributes to dental problems encountered in general practice. The aim of this study is to measure the prevalence of dental anomalies and the associated etiological factors among 15 years old students in Basrah city –Iraq. Materials and methods: The total sample composed of 1000 students (435 males and 565 females) from urban area selected randomly from different high schools in the city. Diagnosis of dental anomalies were recorded by present or absent, diagnosis and recording of enamel defects were done according to the criteria of WHO (1997). Results: The prevalence of hypodontia was 4.6%, Females have higher prevalence than males (5.8% females and 3.0% males), ta
... Show MoreThis study aims to answer a significant problem of social sciences and philosophy: How do we construct an institutional reality such as diplomacy with an objective recognizable existence? The study assumes that the ability to build institutional reality is based on our biological capacity, as it takes different forms in all the institutions we construct. The study takes the theory of the American philosopher John Searle as an approach to examining the assumption. The study sums up important findings; cultures, although they share the biological capacity on which they produce institutional realities, differ in the form of the value standards on which the institutional realities are based. The study recommends the need of Arab social resea
... Show MoreThe aim of this study was to evaluate the risk factors that influence the perforation, regardless of the presence of H. pylori infection, in a sample of Iraqi patients with peptic ulcers, admitted to Al-Kindy Teaching Hospital. A total of 90 patients who had perforated peptic ulcer participated in this study. The diagnosis was based on history, clinical examination, laboratory and radiological investigations and was confirmed intraoperatively. A number of probable risk factors for perforation were investigated. Eighty participants were males and 10 were females (male to female ratio 8:1). About 42.2% of patients were in their fifth decade of life. Forty-nine (54.4%) patients were asymptomatic be
Abstract: Urinary Tract Infections (UTIs) are the most common bacterial infection in humans and a major cause of morbidity and they are the most common cause of hospital visits worldwide. Proper knowledge in identifying factors associated with urinary tract infection may allow the intervention to easily control of the disease in a timely manner. Therefore, the purpose of the study is determining the prevalence of UTI, diagnosis of causative bacterial agents and identifying the factors associated to the urinary tract infection among patients attending Medical City Hospital in Baghdad, Iraq. A total of 237, morning mid-stream urine samples were collected aseptically and the samples were diagnosed according to the standard methods. I
... Show MoreBackground: Hair loss is a common distressing disease and challenging problem for many dermatologist. Telogen effluvium is the most common hair loss disease in which nutritional deficiencies may precipitate the disease through their effect on hair structure and growth.
Study Aim : Validating role of serum ferritin level and body mass index in Chronic Telogen Effluvium and analyzing association between these factors with socioeconomic, demographic, gynecological factors and weight loss effect. Establishing a nutritional preventive advice to improve treatment successfulness and decrease the disease occurrence.
... Show More
Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show MoreIn developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e
... Show More