The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of a construction project, this study constructed the matrix of probability and impact variables and put the periods based on the risk score. Finally, this study identified a fourth main risk group and twenty-two sub-risk factors that are appropriate for the tendering phase of construction projects in Iraq
The study showed a significant rise in the proportion of the labor force in agriculture
activity among the detailed economic activities in 1997 with a rate (%28.9), and then
decreased to (%18.8) in 2011, and this belong to the deterioration of agriculture and the
transition to the other economic activities.
2- The highest percentage of male's participation in year 1997 obtained by the activity (A),
which is represented by agriculture , where was (%30.0) while the highest percentage of
female's participation has been brought by the activity (M) which is represented education
with a rate (% 47.9). while in 2011 that the highest proportion of males' concentration
obtained by the activity (L) with a rate (%23.1) while
The current research aims to identify the time-management skills based on the post-test of the experimental group as well as to examine the effect of a training program on developing the skills of managing time among the study sample. To achieve the research objectives, the researcher designed a scale of time management skill included (30) paragraphs. The research reached that the training program is significantly effective in managing and organizing time. There are statistically significant differences in pre-posttest between the experimental and control groups.
Abstract
The Issue of trade policy is one of the most important topics that researchers have been interested in because of its important role in the economy over the ages. This importance has increased due to the increasing of commercial operations at different levels in both developing and developed countries Foreign trade is one of the means of achieving economic development through the economic surpluses resulting from exports and imports, as it is an important pillar of the economy in general and the Iraqi economy in particular, in light of the transformation process that took place for the Iraqi economy in various fields due to the implement
... Show MoreThe research objective focuses on spraying the leaves of the plant from the top and bottom through a spraying machine designed and made of aluminum with a movable arm equipped with a nozzle holder divided into three parts and each piece contains a nozzle of the type (Flat Fan 120-C3) as the machine was tried in a greenhouse with a study of the effect of changing the positions of the upper and lower piece of the tube carrying the nozzles to four levels (A1, A2, A3, A4) and the effect of pressure change on two levels (2,4) bar and studying the effect of the previous factors on some of the characteristics of the study, Spray quality on adaxial of leaf, Spray quality on the abaxial surfac
This study aimed to identify the degree of use computers in administrative functions (planning, organization, controlling, and evaluation) among school leaders and assistants in public education schools in Sharoorah governorate ، as well as to identify obstacles of use computers in administrative functions from the perspective of school leaders and assistants male and female in public schools during the academic year 1439-1440, the study sample (66) school leaders and assistants, males (58), a and females (44), , and to answer the questions of the study, the researchers developed a questionnaire consisting of (60) items, has been verified sincerity and persistence, and data analysis was used frequencies, percentages an
... Show MoreThe current research aims to determine the extent of the impact of the strategic direction to the business process reengineering, in the Office of the Ministry of Oil To reach that goal was a sample of community research study consisted (50) members of the senior leadership represent the problem in organization researched in the ambiguity of the strategic direction of knowledge of the compatibility of the strategic direction with Business Process Reengineering and used questionnaire, interview and observation to obtain the information needed to search was addressing data by the statistical system spss percentage and the arithmetic mean, standard deviation and coefficient of variation .
... Show MoreThe Research aims to determine role of The Intellectual capital in the performance of small and medium enterprises , to achieve this goal through a researcher from the theoretical literature and studies related to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted by the independent variable intellectual capital, distributed four variable are:( human capital, structure capital ,customer capital, innovation capital) as well as four variable (the financial perspective, the customer perspective, process perspective ,the learning & growth perspective) The study were getting to many results as bellow :the intellectual capital in the small and intermediate p
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023