The purpose of this study is aimed to lay down an arranged platform suited to Iraqi constructional associations which in charge to carry out multi constructional projects, as it fulfilled management requirements and supervising, so that low - cost projects will be controlled in due term and quality. Based on primary info and observed data collected, the study thesis has been formulated in this way: Iraqi constructional sector bodies which are in charge to implement simultaneously multi constructional projects in need to reformulate its organized structure so that it will be more fitted to management and control of these projects. This thesis includes a
theoretical part contained presenting the most important resources locally and int
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThis research aims to study the performance of operations to provide nursing services, which included dimensions (quality, timeliness, leadership skills, behavioral manifestations, relationships with others, problem-solving and decision-making, job performance) and its effects in nursing performance. The research to prove the value of the performance of service delivery processes dimensions by nursing staffs working in Iraqi hospitals, nursing and measuring performance. To find out the nature of nursing services, and a comparison between hospitals to measure the extent of the application dimensional among themselves, and that by relying on the dimensions of a global study, which was measu
... Show MoreMolecular dynamics (MD) simulations were carried out in order to investigate the binding mode of axillaridine-A at the active site of human acetylcholinesterase (AChE) enzyme. 2.0 nanosecond of MD simulations was made for the protein and the complex to dynamically explore the active site and the behavior of the ligand at the peripheral AChE binding site. These calculations for the enzyme alone showed that the active site of AChE is located at the bottom of a deep and narrow cavity whose surface is lined with rings of aromatic residues and Tyr72 is almost perpendicular to the Trp286 ring and forms a stable - interaction. The size of the active site of the complex decreases with time due to increase the interaction. Axillaridine-A forms
... Show More