Preferred Language
Articles
/
NRZTR4gBVTCNdQwClnaA
Measuring and Evaluating Safety Maturity of Construction Contractors: Multicriteria Decision-Making Approach
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Construction of the School Physical Environment Standardized Features Tool
...Show More Authors

Objective: A descriptive design, using the methodological approach, is carried throughout the present
study from April 1st 2012 to May 20th 2013 to construct the school physical environment standardized
features tool.
Methodology: An instrument of (141) item is constructed for the purpose of the study. A purposive
sample of (44) school; (22) public and (22) private ones is selected. Content Validity of the instrument is
determined through the use of panel of (11) expert who are specialists in Community Health Nursing and
Community Medicine. Internal consistency reliability, using the split-half technique, is employed through
the computation of Cronbach alpha correlation coefficient of (0.93) for internal scale. Data

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Construction Research Congress
Risk Perception of Construction Personnel: A Social Construct Outlook
...Show More Authors

Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Ssrn Electronic Journal
Diagnoses of Delay Causes in Construction Projects During Disaster
...Show More Authors

Purpose: The aim of this study was to gain insight into causes of time delays and cost overruns in a selection of thirty case projects in Iraq. Delay factors have been studied in many countries/contexts, but not much data exists from countries under the conditions characterizing Iraq during the last 10-15 years.Design/methodology/approach: A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. For the case of the study, the participants in the projects provided data about the projects through the data collection tool distributed through the questionnaire directed to them. Statistical data analysis was used to build statistical relationships between time and cost d

... Show More
View Publication
Crossref
Publication Date
Fri Apr 28 2017
Journal Name
جامعة بغداد- كلية اللغات- قسم اللغة العبرية
The morphological construction of kitchen terms in Hebrew language
...Show More Authors

This research sheds light on the morphological construction of kitchen terms in Hebrew language, especially methods of derivation, by offering an extensive review of the most important methods of morphological derivation. The field of kitchen terms is a fertile and rich field, where we see daily production of new kitchen tools which require suitable names with specific meanings. Morphologically, the research interested in methods of morphological derivation. So as to know and identify the common and effective methods to derive the kitchen terms in Hebrew language, in addition to put a special glossary of these terms. The research found that most of the kitchen terms were derived according to the methods of derivation prevailing in Hebrew la

... Show More
Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Procurement Management of Power Plants Construction Projects in Iraq
...Show More Authors

The government of Iraq states that despite the massive amounts invested in the power generating sector, the country has been plagued by power outages for more than three decades; One of the most common sources of the problem and significant impact on the waste of public funds in contractual processes. The Ministry of Planning issued the sectorial
specialized standard bidding documents (SSBD) of Design, Supply, and Installation of the Electromechanical Works (DSIoEW), which is primarily designed to support the Ministry of Electricity (MoE) by developing economic projects to improve the contractual process that led to raisings Iraqi electricity generation field. The research evaluates the impact of
applying the SSBD-DSIoEW for

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Abu Mijlaz Al-Basri and his approach to traditional interpretation
...Show More Authors

Research summary

 


This research discloses the study of the methodology of one of the notables of the followers, which is: (Abi Mijlis Al-Basri), who had a clear impact on many commentators after him, especially in the field of interpretation by impact. This study included two topics:

The first: his biography and scientific

The second: his methodology in the traditional interpretation.

View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More
Publication Date
Thu Jan 22 2015
Journal Name
مجلة التربية الاساسية
Synthesis and Characterization of Some New Heterocyclic Compounds Via Unsaturated Ketone with Evaluating of Their biological Activity
...Show More Authors

Preview PDF