Priority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal uncertainty caused by imprecise human judgments will be reviewed and investigated, as well as the most popular theories and methods in group MCDM for presenting uncertain information, creating weights for decision criteria, examining causal relationships, and ranking alternatives. The study concluded that through the strengths and weaknesses reached, fuzzy set theory is the most appropriate and best used in modeling uncertain information. In addition, the methods that are employed the most common in the literature that has been done to explore the correlations between decision criteria have been examined, and it is concluded that the fuzzy best-worst method may be utilized in this research. The Fuzzy VIKOR approach is most likely the best method for ranking the decision alternatives.
International satellite channels in Arabic are targeted to the region with their news bulletins and their innovative programs, attracting the interest of the Arab viewers in their news articles and programs with new ideas and methods as well as high technology in the production and synthesis of videos. Therefore, they work on framing the above, And the media policy that governs, so focused the problem of the study to try to answer the question of the President is how to frame the international satellite channels in Arabic to the phenomenon of terrorism? What are the aspects that are working to highlight and aspects that try to hide? The study adopted the survey methodology for the main news bulletins in the Russian channel today for the
... Show MoreMultiple eliminations (de-multiple) are one of seismic processing steps to remove their effects and delineate the correct primary refractors. Using normal move out to flatten primaries is the way to eliminate multiples through transforming these data to frequency-wavenumber domain. The flatten primaries are aligned with zero axis of the frequency-wavenumber domain and any other reflection types (multiples and random noise) are distributed elsewhere. Dip-filter is applied to pass the aligned data and reject others will separate primaries from multiple after transforming the data back from frequency-wavenumber domain to time-distance domain. For that, a suggested name for this technique as normal move out- frequency-wavenumber domain
... Show MoreKnowledge represents the foundation stone for the work of all organizations, are working who leads the thinking of individuals is the ability that leads to behavior based on rationality, it is the work that creates value to the organization and thus gain access to performance winning where that knowledge is a new type of capital based on the thought and experience and is the so-called intellectual capital, which is renewable and is constantly evolving. The study sought to explain the role of the climax knowledge in achieving the highest levels of performance Organizational and then access to the performance winning in educational organizations the study sample, was found to be a co
... Show MoreThis study aimed to analyze and measure the relationship between oil revenues and financial sustainability in Iraq, the study used the stylistic approach inductive and deductive approach. Accompanied by the use of quantitative and analytical style, which was based on two variables oil revenues and net general budget on annual data covered the period (1990-2013). Among the most important findings of the study contain the time-series variables study on the root of the unit and is not stable in the general level, and become stable after the use of mathematical processors to gain access to a stable by taking the first difference of natural Ogartm of the series. The way (Johnson) to a long-term relationship between oil revenues and ne
... Show MoreDespite all the possibilities held by Iraq for the production of poultry , but there is low and clear in the level of production and a rise in costs and a decline in per capita consumption is due to a number of reasons, including poor investment , stop government subsides , dumping policies , market Bolmottagat imported , the contribution of the merchant squandering of national capacity , weak base material for the growth of this sector , the security situation and the crisis of energy and others .
Despite all this research has shown that there are great investment opportunities in this very sector of the market size and absorptive capacity of his and the growth of per capita income and level of cul
... Show MoreThe implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreArts acts to reduce and exclude everything that is not necessary in the delivery of meaning, especially representative performance, which is based on the intensification of the physical and vocal actions, and in drawing the dimensions of the character. And because that, the artistic staff, among others in the ministry of education, are considered the cornerstone, in the development of theatrical activities in schools, this research came to find out the extent to which teachers in primary schools, in secondary schools and artistic supervisors rely on shorthand mechanisms in the representative performance.
The current research relied on the descriptive approach, in analyzing his sample, which was deliberately chosen, Among the most imp
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show More