Preferred Language
Articles
/
joe-200
Management Model for Evaluation and Selection of Engineering Equipment Suppliers for Construction Projects in Iraq
...Show More Authors

Engineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public and private companies in Iraqi construction sector were employed to identify main criteria and sub criteria for supplier selection and their priorities.The main criteria identified were quality of product, commercial aspect, delivery, reputation and position, and system quality . An effective technique in multiple criteria decision making (MCDM) as analytical hierarchy process (AHP) have been used to get importance weights of criteria based on experts judgment. Thereafter, a management software system for Evaluation and Selection of Engineering Equipment Suppliers (ESEES) has been developed based on the results obtained from AHP. This model was validated in a case study at municipality of Baghdad involved actual cases of selection pumps suppliers for infrastructure projects .According to experts, this model can improve the current process followed in the supplier selection and aid decision makers to adopt better choices in the domain of selection engineering equipment suppliers.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
المجلة السياسية والدولية
Foreign Policy and Asymmetric Threats The United States after 2001 as a model
...Show More Authors

يشهد المسرح الدولي قضايا مستجدة ومستحدثة مثل تعدد الفاعلين من الدول ومن غير الدول وتزايد مساحات نفوذهم وتأثيرهم ،ومن جانب اخر أثرت جائحة كورونا على البيئة والمناخ بشكل ملموس على جوانب عدة. فضلا عن ذلك تأثرت جميع المجتمعات البشرية بالإرهاب والهجمات الالكترونية وغيرها ومن بينها دول والمجتمع الدولي بإفراده مؤسسات وكيان اقتصادي وسياسي وقانوني وأمني وامتداد اثاره واسبابه الكثيرة والمتداخلة وما يثيره من خلق حا

... Show More
Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Sep 18 2025
Journal Name
Sustainable Engineering And Innovation
Using fruit fly and dragonfly optimization algorithms to estimate the Fama-MacBeth model
...Show More Authors

This research proposes the application of the dragonfly and fruit fly algorithms to enhance estimates generated by the Fama-MacBeth model and compares their performance in this context for the first time. To specifically improve the dragonfly algorithm's effectiveness, three parameter tuning approaches are investigated: manual parameter tuning (MPT), adaptive tuning by methodology (ATY), and a novel technique called adaptive tuning by performance (APT). Additionally, the study evaluates the estimation performance using kernel weighted regression (KWR) and explores how the dragonfly and fruit fly algorithms can be employed to enhance KWR. All methods are tested using data from the Iraq Stock Exchange, based on the Fama-French three-f

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Extent of application the principles of total quality management in Improving health services in hospitals exploratory study at Al-kindi hospital / Baghdad health department Rusafa
...Show More Authors

Abstract :

The purpose of the subject of Total quality management is an important management style in organizations including hospitals through the achievement of this method of success in the administration to include        this approach describes the provision of health services and make adjustment and suggestions that  help to improve the quality of health care on an ongoing basis . Hence the idea of the study to shed light on the reality of the application of principles of  Total quality management and to highlight the quality of health services provided in al-kindi hospital / Baghdad health department rusafa and the staff at the hospital were included to find out the appl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Semiotic Transformations in Scenography of the Iraqi Theatre Show "The Play of Ali Al-Wardi and his Opponent- A Model": باسم محمد احمد حسن
...Show More Authors

      Semiotics has been through wide experiences in various human sciences, especially in the fields of poetry, novel and myths. But its interest in the theatre and drama was much less and unique despite the richness of the theatrical connection as it is a probable field for the semiotic investigation which may require the semiotic approach in dealing with the theatrical and dramatic show during the two processes of: structural construction and deconstruction starting from a set of overlapping and interconnected texts inside the show, which can be limited in the text, then it would be difficult to semiotically cover all these complex and tricky texts. The theatre in its structural and aesthetic construction is c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 19 2019
Journal Name
Scientific Reports
Environmental microcystin targets the microbiome and increases the risk of intestinal inflammatory pathology via NOX2 in underlying murine model of Nonalcoholic Fatty Liver Disease
...Show More Authors
Abstract<p>With increased climate change pressures likely to influence harmful algal blooms, exposure to microcystin, a known hepatotoxin and a byproduct of cyanobacterial blooms can be a risk factor for NAFLD associated comorbidities. Using both <italic>in vivo</italic> and <italic>in vitro</italic> experiments we show that microcystin exposure in NAFLD mice cause rapid alteration of gut microbiome, rise in bacterial genus known for mediating gut inflammation and lactate production. Changes in the microbiome were strongly associated with inflammatory pathology in the intestine, gut leaching, tight junction protein alterations and increased oxidative tyrosyl radicals. Increased lactate produ</p> ... Show More
View Publication Preview PDF
Scopus (44)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Mon Sep 02 2024
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
Sustainable security strategies to confront violent extremism in Iraq after 2017 and their future prospects
...Show More Authors

As contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o

... Show More
View Publication