Preferred Language
Articles
/
DYaHcoYBIXToZYALIYps
Identify the Critical Risk Factors at the Tendering Phase in Iraq
...Show More Authors

Risk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has been utilized to examine the foremost group of risk factors by Mean Score Technique (MS) and ranking from top to bottom. The risk factors of tendering phase analysis by using relative Importance Index (RII) method then ranking from top to bottom using their values. Consequences of this research article assessed that the technical criterion is the most efficient criteria at last, management criteria with all risk factors that showed in this research will be considered.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Developing Tenth Grade Female Students' Attitudes in Critical Reading Skills Using the Reflective Thinking Method in the Sultanate of Oman
...Show More Authors

        This study aimed to developing the skills of critical reading for the tenth basic school female students through a training program using the reflective thinking method. The study sample consisted of (64) students. To achieve the objective of the study, the researcher uses the quasi-experiment approach consisting of a control group (32 students) and an experimental group (32 students). The researcher used three research inventories as follows: 1) A list of critical reading skills included (30) skills within three aspects (Recognition – Deduction – Evaluation and Judgment). 2) An executive program using reflective thinking for developing critical reading skills. 3) Achievement test to measure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
IRAQI CONSUMER AWARENESS OFF THE RISK ASSOCIATED WITH CONSUMING CANNED FOOD: IRAQI CONSUMER AWARENESS OFF THE RISK ASSOCIATED WITH CONSUMING CANNED FOOD
...Show More Authors

The aim of this research was to indicate the opinion of the Iraqi consumer awareness of the risks associated with consuming canned food, the questionnaire was included 20 questions for label information, consumer culture, shopping, marketing, awareness and knowledge as a tool to survey the opinions of 300 consumers in Baghdad, the data was analyzed by using percentage, weighted mean, and weight percent, the results obtained showed that the Iraqi consumer need more information, training and guidance programs in food safety handling issue for canned food, especially in analysis of label information and growing of consumer culture for shopping, right marketing, awareness and knowledge.

View Publication Preview PDF
Publication Date
Thu May 21 2026
Journal Name
Enterpreneurship Journal For Finance And Business
The role of psychological ownerships' dimensions in deterring the effects of toxic leadership: Analytical research in some companies at the Ministry of Industry and Minerals in Iraq
...Show More Authors

View Publication
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Orbital factors in the hair Alberdony: (Denial is a model
...Show More Authors

The theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
 The orbital masses are one of these morphines and functional components that achieve function
The Togolese

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Aug 16 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Stylistic Analysis of the Ideological Positioning in Some Selected Poems by John Donne
...Show More Authors

This paper deals with the ideological positioning of the English poet John Donne in a selected poems of his i.e Holy Sonnet X, as regards the theme of death found therein. The researchers adopt an emerging branch of stylistics, called Critical Stylistics, as proposed by Jeffries (2010) in order to uncover the ideologies of the author regarding the topic concerned and how linguistic choices are used to slant ideas. The model is comprised of ten tools of analysis which, upon being applied to the selected data, have shown how the poet exploits language resources in order to pass his ideology and influence his readers. In this paper, the workings of only one tool are presented as applied to a certain portion of the data.

View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Identify trends of media students about satellite channels specialized and its role in the satisfaction of their wishes and develop their abilities
...Show More Authors

This search is field research, which aims to explore the trends of students in media department toward specialized Satellite Channels and identify the knowledge capacity and its role in the development of their knowledge’s, represented by watching those channels as well as media students' habits exposed by those channels. As to the public is a key element in the process and substantive communication, the Sociological studies information on that article information is not complete its work, but that he was receiving from before receiving, and send every piece of information content in order to achieve a certain goal, therefore, is the future of receiving such information in order to achieve a particular goal, which is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
The International Journal Of Oral & Maxillofacial Implants
Early Failure Rate and Associated Risk Factors for Dental Implants Placed With and Without Maxillary Sinus Augmentation: A Retrospective Study
...Show More Authors

View Publication
Scopus (26)
Crossref (20)
Scopus Clarivate Crossref