Preferred Language
Articles
/
joe-1847
Main Delay Factors of Implementation EPC Construction Projects in Iraq
...Show More Authors

This essay aims to highlight the most important issues and difficulties facing implementing large projects that follow the turn-key method, considered one of the types of contractual methods in Iraq, especially for large and complex projects requiring speedy completion. The projects implemented in this way face delays and delays in completion, which led to the lack of benefit from the projects for which they were implemented, especially those affecting the lives of citizens within the health sector. The case study dealt with the construction of hospitals with multi-bed capacities within multiple governorates in Iraq, With large financial allocations within the federal budget of the Government of Iraq over several years. After conducting a descriptive statistical analysis of the data obtained through a field survey and interviews with individuals working in the construction sector with experience in their field. The most important 10 factors were identified from a list of 51 delay factors (distributed according to the questionnaire forms) with a high RII. These factors were related to the delay in the payment of the contractor's dues, the delay in processing materials, the issuance of new instructions and regulations, the delay in obtaining official approvals from the relevant authorities, Errors in designs or contracting documents, lack of cooperation between the contracting parties, and multiple spare orders for reasons belonging to the employer. The article also included the most important suggestions that contribute to reducing the delay in completing projects.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The role of strategic Agility in organizational excellence In Ministry of Construction, Housing, Municipalities and Public Works
...Show More Authors

The aim of this research is to identify the role of strategic agility achieving organizational excellence in one of the formations of the Ministry of Municipalities (Dhi Qar Sewage Directorate), as important service organizations that have a key role in serving and developing the society which faced many administrative challenges and issues and as a result of the changes in the environment is continuing and accelerating, so the adoption of modern administrative concepts such as strategic Agility and knowledge of their role in achieving organizational excellence can help them in facing these changes and achieve what they aspire to. In order to achieve research objectives, two main hypotheses have been formulated. The first hypothe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
The Symbolic Construction of Scenes of Love in the Feature Film: محمد عبد الحميد ضيدان
...Show More Authors

Scenes of love constitute a large space within the orbit of the movies, so that there is almost no film (no matter what kind) void of these scenes, as they are associated with many dimensions and they constitute a major attraction for viewers, and thus the direction solutions and their connection to the director's vision constitute a large part in the process of employing signs to highlight what should be highlighted or to refer to it symbolically on the grounds that the director does not have full freedom in the transfer of scenes of love at all levels as they are in reality. The research included three sections within the theoretical framework:The first section: the concept of image and its rhetorical importance. This section discussed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
Regionalism Hegemony of Political Life in Tunisia and its influence upon construction of Political System
...Show More Authors

The topic area of that’s paper dealing with regionalism hegemony upon ruling affairs and political life in Tunisia, this phenomena had historical origins, even before region of French occupation in 1881, after independence, the regionalism domination was practice and normal, the political system justified it's with many causes, like level of education, connection with Western civilization, enlighten intelligent, economic conditions in coast region and North of Tunisia compared with the South, also the role of President Bourqiba as founder of Modern Tunisia, he was from Monster (North of country) which was dominated as charismatic leader dedicate the regionalism domination through decades, yet after revolution in 2011, little changes ha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
On the Use of the First-Person Pronoun ‘we’ in Final-Year Master Projects of South Algerian EFL Students
...Show More Authors

Literature on the use of the first-person pronoun in abstracts and conclusion sections of final-year projects is limited. In case of Algerian Master students, it is too scant. The present paper aims at filling this gap through a study concerned with students’ and engagement in their final projects (memoirs). This quantitative study examines the use of “we” and its various types, “our- us-I, my, the researcher” in memoirs chosen at random from the d-space portal of the University of Adrar, southern Algeria. Sixty-five papers, submitted in the fields of Linguistics or didactics between 2015 and 2020 and representing nearly half of the whole memoirs’ depository at the library’s d-space, constituted the corpus of study. The des

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DESIGN AND IMPLEMENTATION AN IRAQI CITIES DATABASE USING K-D TREE
...Show More Authors

This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).

View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Performance Evaluation of Scalar Multiplication in Elliptic Curve Cryptography Implementation using Different Multipliers Over Binary Field GF (2233)
...Show More Authors

This paper presents a point multiplication processor over the binary field GF (2233) with internal registers integrated within the point-addition architecture to enhance the Performance Index (PI) of scalar multiplication. The proposed design uses one of two types of finite field multipliers, either the Montgomery multiplier or the interleaved multiplier supported by the additional layer of internal registers. Lopez Dahab coordinates are used for the computation of point multiplication on Koblitz Curve (K-233bit). In contrast, the metric used for comparison of the implementations of the design on different types of FPGA platforms is the Performance Index.

The first approach attains a performance index

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Egyptian Journal Of Aquatic Biology And Fisheries
Environmental factors drive phytoplankton primary productivity in a shallow Lake
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 22 2019
Journal Name
Innovations In Pharmacy
Evaluate Factors Influencing Depression in Baghdad: Using Deck-Depression Inventory
...Show More Authors

Objective: This study goal was to screen participants from different settings in Baghdad for depression using Beck Depression Inventory (BDI) scale and identify factors influencing the levels of depression. Methods: This cross-sectional study included a convenience sample of 313 people from four settings (teaching hospital, college of medicine, college of pharmacy, and high school) in Baghdad, Iraq. The participants were screened using paper survey relying on the BDI scale during spring 2018. Using multiple linear regression analysis, we measured the association between depression scores and six participant factors. Results: The overall prevalence of depression in our sample was 57.2%. Female participants had higher BDI

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref