The research problem is that most of the construction projects exceed the planned value, due to the failure to implement the plans on time. The current study aims to monitor the implementation of the project and for each of the executed tasks of the table of quantities in order to detect deviations at the time they occur, evaluate the time and cost performance, and then identify the areas of waste and analyze the implementation of each task in order to diagnose the underlying problems and find possible and applicable solutions in the environment Iraqi. The research was applied in one of the companies specialized in the field of construction projects, and one of the most important conclusions reached is the possibility of applying
... Show MoreThe historical center cities were exposed to change, which included its social and economical structures, Which led to sweeping changes in land use, causing a change in the result, in urban fabric and the physical structure and therefore to see visual. We have attracted these centers as a result of pressure from urban development and contemporary reflection of the agents of change which have been hit during the late period a development residential newly not sympathize mostly with the content of the historical and at the expense of removing large parts of the urban fabric and replace it with patterns of structural and styles of architecture has not been connected with reality. Which led to the loss of some historical and architec
... Show MoreThe article aims to study the crisis of political change from three Phases . The first focuses on the crises of political legitimacy and democratic postponement, as fundamental issues in analyzing the phenomenon of power struggle through the dialectic between the concept of historical legitimacy and institutional fragility from the beginning of statehood in 1962 to the stage of multi-partyism and the cessation of the electoral process in the 1990s. While the second focuses on the question of the monopoly of power in the post-terrorism and national reconciliation according to considerations Political, social and security measures to prolong the life of the regime and avoid the demands of political change brought about
... Show MoreIn modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreSoil pH is one of the main factors to consider before undertaking any agricultural operation. Methods for measuring soil pH vary, but all traditional methods require time, effort, and expertise. This study aimed to determine, predict, and map the spatial distribution of soil pH based on data taken from 50 sites using the Kriging geostatistical tool in ArcGIS as a first step. In the second step, the Support Vector Machines (SVM) machine learning algorithm was used to predict the soil pH based on the CIE-L*a*b values taken from the optical fiber sensor. The standard deviation of the soil pH values was 0.42, which indicates a more reliable measurement and the data distribution is normal.
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreIn this paper, an experimental study was conducted to enhance the thermal performance of a double-pass solar air heater (SAH) using phase change material (PCM) for thermal storage at climatic conditions of Baghdad city - Iraq. The double-pass solar air heater integrated with thermal storage system was manufactured and tested to ensure that the air heating reserved after the absence of the sun. The rectangular cavity filled with paraffin wax was used as a latent heat storage and incorporated into the lower channel of solar air heater. Experiments were carried out to evaluate the charging and discharging characteristics of two similar designed solar air collectors with and without using phase change material at a constant
... Show MoreOne of the most Interesting natural phenomena is clouds that have a very strong effect on the climate, weather and the earth's energy balance. Also clouds consider the key regulator for the average temperature of the plant. In this research monitoring and studying the cloud cover to know the clouds types and whether they are rainy or not rainy using visible and infrared satellite images. In order to interpret and know the types of the clouds visually without using any techniques, by comparing between the brightness and the shape of clouds in the same area for both the visible and infrared satellite images, where the differences in the contrasts of visible image are the albedo differences, while in the infrared images is the temperature d
... Show More