Preferred Language
Articles
/
joe-382
Development of a Blueprint Impact System of the risks on construction projects Implementation
...Show More Authors

In Production and Operations Management the specialists  have  tried to develop a strategy to counter the risks arising from the activities of the organization and of waste of various types and therefore the risk management in the contemporary framework represents a phenomenon of new quality, and can not be this phenomenon to take practical dimensions, but the development of culture of the organization towards the risks and deal with all aspects and paint ways to address them within an integrated program, and requires new skills and systems provide accurate information capable of coordination between the various parties within the organization.

     The research aims to develop a blue print to analyze the relationship between the impact of risk and stages of implementing of the project and, the effect of risk relationship with the type of contract, and the impact of risks to do with the type of construction works. In this paper a number of risks has been identified   that have already occurred from the study of a number of construction projects completed and theoretical studies and interview a number of construction industry experts to determine the extent of the impact of these risks in each of these three axes in construction projects in Iraq for the purpose of responding and management.

     The study found a set of conclusions such as existing of priority in happiness of risks which proof that there is an relationship between the risks and sort of stage, contract and constructional work. In the light of what has been reached for the purpose of benefiting from the computer automated features a program have been used ( Vanguard Software System ) to build the decision tree in order to manage the risks according to their priority in happiness.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Acta Facultatis Medicae Naissensis
A correlation between body mass index and refractive errors
...Show More Authors

Background. Body mass index (BMI) is a person's weight in kilograms (or pounds) divided by the square of height in meters (or feet). Obesity affects a wide spectrum of age groups, from the young to the elderly, and there are several eye diseases related to obesity like diabetic retinopathy, floppy eyelid syndrome, retinal vein occlusion, stroke-related vision loss, age-related macular degeneration, and possibly, refractive errors. Refractive errors (RE) are optical imperfections related to the focusing ability of the eye and are the main cause of visual impairment which may result in missed education and employment opportunities, lower productivity and impaired quality of life. Aim. The study aimed to find an association between bod

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Alexandria Engineering Journal
A new tilted aerial robotic platform: Modeling and control
...Show More Authors

View Publication
Crossref (1)
Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
THE CHALLENGES OF GLOBALIZATION OF MEDIA AND WAYS OF CONFRONTATION
...Show More Authors

The successive international changes in the economic, political, cultural and other fields resulted in many phenomena that occupied different levels of interest, and have been followed up, studied and analysed by specialists and researchers especially under the development of the media in the global communication.

Even though these phenomena had reflections in the communication domain like development and changes in the mechanism of behaviours between the international communities, they created in the meantime a phenomenon that caused an imbalance in the production, spread and the use of the informations that were supposed to be for fewer than 5 countries whereas it actually it is for more than 180 countries.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
new Estimator of the parameter of negative exponential
...Show More Authors

the main of this paper is to give a comprehensive presentation of estimating methods namely maximum likelihood bayes and proposed methods for the parameter

View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Urban renewal of the historic centre of Rusafa
...Show More Authors
Abstract<p>The historical centers represent the present of the past, which is embodied in its buildings and spaces, which are places of continuous life bearing the history of the city with all its material and objective dimensions, making it living centers that form an essential part of the body of the city and give it a vision for another time and it represents a cultural heritage that should be preserved and maintained. The research started from the reality that indicates the great change in the land uses of the region and the deterioration of the situation and change in use in addition to the neglect of its role and historical status, the study aims to study the subject of urban renewal of he</p> ... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref