Preferred Language
Articles
/
joe-1907
Public Procurement Crisis of Iraq and its Impact on Construction Projects
...Show More Authors

 

The public procurement crisis in Iraq plays a fundamental role in the delay in the implementation of construction projects at different stages of project bidding (pre, during, and after). The procurement system of any country plays an important role in economic growth and revival. The paper aims to use the fuzzy logic inference model to predict the impact of the public procurement crisis (relative importance index and Likert scale) was carried out at the beginning to determine the most important parameters that affect construction projects, the fuzzy analytical hierarchy process (FAHP) to set up, and finally, the fuzzy decision maker's (FDM) verification of the parameter for comparison with reality. Sixty-five construction projects in Iraq have been selected, and the most crucial crisis variables were used for calculating the weights and their importance, using the fuzzy logic inference model to verify the crisis parameters and the extent of their impact in preparation for predicting the mathematical model of public procurement parameters. After the algorithm had been completed, it was noted that the fast, messy genetic algorithm produced a little difference between training and testing (0.012% and 0.0057%), which is more reliable for predicting mean results from models. The paper’s major conclusion is that 18 crisis factors in public procurement through different stages affect construction projects in Iraq.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Aug 13 2017
Journal Name
Iraqi Journal Of Agricultural Sciences
EFFECT OF SUPPLEMENTING DIFFERENT LEVELS OF CONJUGATED LINOLEIC ACID (CLA) TO THE DIET ON PRODUCTIVE PERFORMANCE OF BROILER CHICKEN
...Show More Authors

This study was carried out at Poultry Research Station, State Board of Agricultural Research, Ministry of Agriculture for the period from 27 September 2014 to 9 November 2014 to evaluate the Supplementation of different levels of Conjugated Linoleic Acid (CLA) on productive performance of broiler. Four hundred eighty chicks (Ross-308),one day old were randomly distributed to four dietary treatments for 42 days of age with 3 replicates/vtreatment (40 bird/replicate). Experimental treatments were as follow; T1 (Control diet) without supplement, while the treatment T2,T3 and T4  were Supplemented with 1, 1.5, 2 g CLA /kg diet  respectively. The results showed significant (P ≤ 0.05) increased in mean of body weight, weight gain, ave

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
The Influence of Ablation Speed on the Synthesis of Carbon Nanostructures Via Pulsed Laser Ablation of Asphalt in Ethanol
...Show More Authors

Pulsed liquid laser ablation is considered a green method for the synthesis of nanostructures because there are no byproducts formed after the ablation. In this paper, a fiber laser of wavelength 1.064 µm, peak power of 1 mJ, pulse duration of 120 ns, and repetition rate of 20 kHz, was used to produce carbon nanostructures including carbon nanospheres and carbon nanorods from the ablation of asphalt in ethanol at ablation speeds of (100, 75, 50, 10 mm/s).  The morphology, composition and optical properties of the synthesized samples were studied experimentally using FESEM, HRTEM, EDS, and UV-vis spectrophotometer. Results showed that the band gap energy decreased with decreasing the ablation speed (increasing the ablation time), the mi

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Effect of leadership patterns on the phenomenon of jop burnout among employees at Baghdad College of Economic Sciences University
...Show More Authors

This study deals with the impact of leadership styles in its three main dimensions (democratic, autocratic, lenient) as an independent variable of the dimensions of functional combustion (emotional stress, inhumanity, personal achievement). The research sought to achieve a set of goals, the most prominent of which are: studying the reality of the researched organization to identify the leadership patterns used in its management and its impact on the phenomenon of functional combustion, Moreover, knowing the extent of support for these established patterns and their contribution to mitigating the phenomenon of functional combustion in the organization's environment, and testing the impact of these leadership patte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Effect of Secondary Metabolite Crude of Metarhizum anisopliea Fungus on the Second Larval Stage of the Housefly Musca domestica
...Show More Authors

         The house flies Musca domestica )Diptera:musidae) are the primary carrier of many pathogens such as cholera, typhoid, anthrax, and others. The use of chemical pesticides as a basic method of control leads to many problems at the environmental and health level. The use of safe alternatives to chemical pesticides has become an urgent necessity. The research aims to find biological alternatives that are environment-friendly and non-pathogenic to humans in controlling house flies through the possibility of extracting and diagnosing some secondary metabolites produced by the fungus Metarhizium anisopliae and testing their effects on the second larval stage of house flies using different treatment methods that include

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication