Priority of road maintenance can be viewed as a process influenced by decision-makers with varying decision-making power. Each decision-maker may have their view and judgment depending on their function and responsibilities. Therefore, determining the priority of road maintenance can be thought of as a process of MCDM. Regarding the priority of road maintenance, this is a difficult MCDM problem involving uncertainty, qualitative criteria, and possible causal relationships between choice criteria. This paper aims to examine the applicability of multiple MCDM techniques, which are used for assessing the priority of road maintenance, by adapting them to this sector. Priority of road maintenance problems subject to internal uncertainty caused by imprecise human judgments will be reviewed and investigated, as well as the most popular theories and methods in group MCDM for presenting uncertain information, creating weights for decision criteria, examining causal relationships, and ranking alternatives. The study concluded that through the strengths and weaknesses reached, fuzzy set theory is the most appropriate and best used in modeling uncertain information. In addition, the methods that are employed the most common in the literature that has been done to explore the correlations between decision criteria have been examined, and it is concluded that the fuzzy best-worst method may be utilized in this research. The Fuzzy VIKOR approach is most likely the best method for ranking the decision alternatives.
The tensions and crises and the psychological pressure as well as the rapid changes and great development which is taking place in the present time. And witnessing community of wars and conflicts that give rise to future concern among members of the community in general and students in particular, as it included the current research a number of chapters, the First chapter contains the research problem, the important goal, then set researcher terminology that has defined and contained in the title of research in the form (concern the future, artistic expression, middle school). The Second chapter included three sections, the first included the nature of adolescence and traits, characteristics and pr
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThis research aims at identifying the level of quality of University environment according to the viewpoint of female students taking the College of Sciences for Woman an example, as represented in the college units as registration unit and the unit of students' affairs, the curricula, instructors, study halls, the college library, scientific labs, computer access, stationary and photocopying services, health care center, the unit of artistic, cultural and sportive activity, the canteen, the college gardens, college buildings and equipment and bathrooms. To achieve the objectives of the research, the researcher prepared a questionnaire to identify the viewpoints of female students concerning the extent of the availability of the standards o
... Show MoreThe aim of this study was to measure the effectiveness of a proposed program to develop the creative abilities of the students of Tabuk University and its impact on the creative output of the NEOM project. The sample of the study consisted of (50) university students divided into two groups: an experimental group of 25 students who receive the proposed training program, and control group of (25) students.
To achieve these objectives, the researcher designed and developed tools to collect the required data, which were verified their validity and reliability.
The descriptive statistics of mean, standard deviations, correlation coefficient, T test for the associated sample were used in the analysis of the results of th
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThe present research aims to test the effect of cognitive complexity as an independent variable in organizational agility as a responsive variable among the leaders working at the headquarters of the Iraqi Petroleum Products Distribution Company.
To conclude a number of recommendations that contribute in the organizational agility in the company, and due to the importance of this research in public organizations and its notable role in community organizations. The research was carried out on a random sample of 101 individuals out of a total of 308, which represents the high leaders in the company (general managers, head of departments, and division officials). A questionnaire was used as information
... Show More