Due to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the application of these provisions between the two contracts. The research results revealed several differences, the most important of which is that the engineer has a dual role in Iraqi (SBDW). On the one hand, he is appointed by the employer to carry out specific duties under the contract. On the other hand, the engineer also has powers related to the settlement of claims and this first level of conflict avoidance between the two parties, Unlike the SBC/Q2016 contract, which appoints a neutral third party to mediate the problem. In addition, resolving disputes between the two parties, according to the Iraqi (SBDW), needs a long time compared with JCT-SBC/Q2016.
لا يزال المهتمون بلعبة كرة السلة يبحثون عن إيجاد الوسائل الأكثر أهمية وصولاً إلى ما تطمح إليه الدول لتحقيق افضل المستويات في نواحي اللعبة كافة من خلال التغلب على المعوقات التي تحول دون تقدمها إلى الأمام بالدراسة والبحث. ومن هذا المنطلق انصب البحث في ضرورة معالجة القصور الناتج عن عدم وجود المستويات المعيارية ذات العلاقة باختبارات قدرات اللاعبين وعلى وفق مراكز اللعب ولا سيما المهارية الهجومية، ومما شكل ذلك ضع
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreA New Perspective About Masculinity and the Issue of Identity in Ernest Hemingway's The Old Man and The Sea and Michael Ondaatje's in The Skin of a lion
Iraqi oil crudes have some of the physical and chemical characteristics that distinguish it from other types of oil crudes in the world. Some of these features such us molecular composition, rheological, viscosity and emulsions are studied carefully by researchers. In this work, a comparative study of the linear and the non-linear optical properties for typical heavy and light crude oils of Iraqi origin was studied utilizing Z-scan technique. The He -Ne laser of wavelength 632.8 nm had been used for this purpose. These samples were collected from Basra and Kut oil fields. The values of the non-linear refractive index (n2), non-linear absorption coefficient (β), and third-order electrical susceptibility (χ3) were e
... Show MoreThis study aims to deliver the woman’s image and to unveil on how to be introduced in the TV series. The research is based on the survey method-using content analysis tool. The research sample represented in the TV series produced by the IMN, which were displayed in 2014 and used the pattern of Margaret Gallagher to analyze the content of the series in accordance with the frame analysis theory.
The study came up with declination of the woman’s representation compared with man in Iraqi TV drama, also the study finds that the series introduced the woman according to the personal, social, political, and economic frames in a standardizing method. It focuses on the characteristics always attributed to it as showing her obedient of the