A lack of adequate building maintenance is a significant obstacle faced by governmental hospitals. This paper evaluates factors that negatively impact building-maintenance practices in Iraq. A literature review was conducted to identify factors affecting maintenance. A list of 42 factors affecting hospital-buildings was collected from previous studies and tested using a structured questionnaire distributed to hospital-maintenance experts. During the data analysis, 76 valid questionnaires were used. Based on the respondents’ ratings, the relative-importance index (RII) was used to determine the level of importance of each factor. From the results, it was concluded that twelve factors affect maintenance practices in hospital buildings: faulty design (0.889), lack of funding (0.874), inadequate training (0.871), misuse of building facilities (0.866), construction errors (0.863), lack of work experience (0.858), building age (0.826), individual modifications carried out by the hospital staff (0.826), shortage of maintenance staff (0.824), administrative corruption (0.821), selection of unqualified maintenance contractors (0.816) and unavailability of skilled appointed maintenance personnel (0.808). Understanding these factors’ effects is essential for maintenance-department managers to develop strategies for maintaining hospital buildings in Iraq by controlling them, as well as identifying problems and finding appropriate solutions to avoid them. KEYWORDS: Governmental hospitals, Maintenance, Iraq, Building maintenance, Maintenance practices, Factors affecting maintenance
A simple straightforward mathematical method has been developed to cluster grid nodes on a boundary segment of an arbitrary geometry that can be fitted by a relevant polynomial. The method of solution is accomplished in two steps. At the first step, the length of the boundary segment is evaluated by using the mean value theorem, then grids are clustered as desired, using relevant linear clustering functions. At the second step, as the coordinates cell nodes have been computed and the incremental distance between each two nodes has been evaluated, the original coordinate of each node is then computed utilizing the same fitted polynomial with the mean value theorem but reversibly.
The method is utilized to predict
... Show MoreThe Sunnah of the Prophet has a great impact in building human behavior, and the formation of Islamic thought, has worked to spread science in all of Egypt, as it carried to the people of the eternal prophecy of the love of science, it was a source of knowledge and civilization. It is a generous source, a rich source of the Islamic nation, always tender, and renewed benefit, which is not only a source of legislation and language but is a source of guidance for thought and guidance of behavior, and the Hadith The importance is obvious In the integration of Islam, and show aspects of human integration in the personality of Mustafa , and the Muslims are interested in talking - collected and codification -, and made the effort of the cent
... Show MoreThis study deals with the role of compensation system in improving the quality of educational services (University of Halabja as a Model) also our problem was the following question ; What is the role of compensation system in its different dimensions in improving the quality of educational services? And what is the relationship and impact of using the dimensions of the compensation system to improve the quality of educational services? The hypothesis of the research included the correlation and the impacts between the compensation system and its combined variables in the quality of educational services. This was proved through a field study and the distribution of questionn
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreIn the midst of the public narrative film , we discussed the issue of dealing with the current narrative more specialized which its future dimension form shift and twist on the level of construction narrative film in some of its diverse and renewable trends in its two ways theoretical and practical and non-give important implications for the modes of operation of the renewable narrative structures and the fact that the cinema is an arts which always open to ideas in neighboring fields and this come naturally as a result of the continuing intellectual and knowledge sharing between cinema and other science . our current research has already begun to address the issue in a stream of consciousness narrative structure film based on all that t
... Show MoreThe present paper concerned with study the of combined electro-osmotic peristaltic transport with heat and mass transfer which is represented by the Soret and Dufour phenomenon with the presence of the Joule electrothermal heating through a microchannel occupy by Rabinowitsch fluid. The unsteady two-dimensional governing equations for flow with energy and concentration conservation have been formed in a Cartesian coordinate system and the lubrication theory is applied to modify the relevant equations to the problem. The Debye-Hukel linearization approximation is utilizing to modify the electrohydrodynamics problem. The expressions for the axial velocity, the temperature profile, the concentration profile, and the volumetric flow rate are
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show More