Preferred Language
Articles
/
joe-1747
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manner that is consistent with logic and is predicated on the temporal evolution between 1990 and 2015.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
مجلة نسق
The Effectiveness of a Program Based on the Theory of the Five Minds in Developing Focused Reading and Extensive Reading Skills among Second-Year Middle School Students
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Reflection of mergers and acquisitions in the stock returns and financial performance - An Empirical Study of major international companies to the pharmaceutical industry-
...Show More Authors

Research aims to identify the immediate impact of the announcement of mergers in the stockholders and the feasibility of gain abnormal return and benefiting from  asymmetric information during the announcement that unite 30 days before the announcement of the merger, and announcement day, and 30 days after the announcement of the merger. It was the largest and most important mergers and acquisitions pick that occurred during the global financial crisis, specifically in health care/pharmaceutical industry, Pfizer and Wyeth merger with Novartis acquisition on Alcon. search has adopted three hypotheses: the first hypothesis that ((achieves the target company's shareholders positive abnormal return (or negative) during and befor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of Risk Management practices and their relationship to the Entrepreneur behavior of managers in insurance companies: applied research
...Show More Authors

The objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 01 2025
Journal Name
Radiology Case Reports
Intradural extra-medullary spinal cord tumor after dorso-lumbar spine fixation following 12th dorsal vertebra burst fracture: A case report with literature review
...Show More Authors

View Publication
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Nurse Education Today
Diabetes knowledge of nurses in different countries: An integrative review
...Show More Authors

View Publication
Scopus (52)
Crossref (49)
Scopus Clarivate Crossref
Publication Date
Sun Mar 26 2023
Journal Name
Wasit Journal Of Pure Sciences
Covid-19 Prediction using Machine Learning Methods: An Article Review
...Show More Authors

The COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Signal Processing Techniques for Robust Spectrum Sensing
...Show More Authors

Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Applied Mechanics And Materials
Artistic Techniques for Developing Creativity in Design
...Show More Authors

The design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Database for Baghdad Soil Using GIS Techniques
...Show More Authors

teen sites Baghdad are made. The sites are divided into two groups, one in Karkh and the other in Rusafa. Assessing the underground conditions can be occurred by drilling vertical holes called exploratory boring into the ground, obtaining soil (disturbed and undisturbed) samples, and testing these samples in a laboratory (civil engineering laboratory /University of Baghdad). From disturbed, the tests involved the grain size analysis and then classified the soil, Atterberg limit, chemical test (organic content, sulphate content, gypsum content and chloride content). From undisturbed samples, the test involved the consolidation test (from this test, the following parameters can be obtained: initial void ratio eo, compression index cc, swel

... Show More
View Publication Preview PDF
Crossref (9)
Crossref