Risk identification and assessment can be analysed using many risk management tools. Fishbone diagram is one of these techniques which can be employed, for the identification of the causes behind the construction failure, which has become a phenomenon that often gets repeated in several projects. If these failures are not understood and handled scientifically, it may lead to disputes between the project parties. Additionally, the construction failure also leads to an increase in the project budget, which in turn causes a delay in the completion of the projects. Punching shear in reinforcement slab may be one of the reasons for construction failures. However, there are many doubts about other causes that lead to this failure as well as the role of these causes in the construction failure. Also, there are many causes linked to this failure of which some fall on the designer and the others fall on the contractor. Thus, this research aims to determine the causes of punching shear failure in the concrete slab and its role in the failure using a logic managerial analysis. For this purpose, the applicability of the Fishbone diagram has been extended, for the analysis of probability as well as the impact of the risk of punching shear, thus elucidating the risk score of each category without ignoring the global risk. In this direction, interviews and questionnaires are conducted with numerous experts specialize in both the design and execution field of construction projects for identifying the most important causes that lead to the occurrence of punching shear failure. Further, the Fishbone diagram for punching shear’s risk illuminated that impact of some of the primary and secondary causes such as planning, designing, and maintenance is more than the expectation. Therefore, the concentration in these areas should be carried out by taking into consideration the adapt risk response plan to prevent or mitigate these risks.
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThe results show that the compound affects the rest of the living cells after treatment for 15 minutes The influence Almtafr has had the effect BU less than the effect of NTG in the case of the registration of every of Struptomaysan resistance and rifampicin, although the first attribute more responsive
Autorías: Suhair Meteab Munaf, Ali Abdulateef Ali, Mohannad Salman Dawood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 4, 2022. Artículo de Revista en Dialnet.
Irak Türkmen edebiyatının divan şiirlerinde büyük simalardan sayılan , ve
Irak Türklerinin en içli şairi olan Osman Mazlum .Şiirleri yalnızlık hem ve kederle
dolu olan şairin , her zaman büyük bir üzüntüye kablandığı için bunun tüm
şiirlerinde yansıtmıştır . Her zaman kaderden şikayetci olan şiirlerinde (Mazlum)
mahlasını kullanmıştır . Şairin klasik edebiyatında önemli bir yeri vardır . Hoyrat
yoluyla edebiyata giren mazlum'un gönül yarası bu aşıkla dolunca feyizlenmeye
ve türlü nağmelerle seslenmeğe başladı . İşte bu güne kadar yazmış olduğu şiirler
o sesler hep ahang , terennüm ve tesavırıdır . Bende bu araştırmada i
... Show MoreGenerally, the academic facilities necessitate specific criteria to be under the regional standards such as creative leaders, and a positive climates that induce to create an organizational culture within the academic institution. Consequently, these variables promote to improve the educational and administrative performance pursuing to achieve the general objectives. Thus, the current research aims to explore the level of privileged organizational culture among Baghdad University Colleges, explore the administrative creativity of deans and their assistants in addition to identify the relationship between them. The researchers prepared two instruments which were distributed among (70) individual of the targeted sample to collect the requ
... Show MoreA novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)
Problem solving methods and mechanisms contribute to facilitating human life by providing tools to solve simple and complex daily problems. These mechanisms have been essential tools for professional designers and design students in solving design problems.
This research dealt with one of those mechanisms, which is the (the substance-field model model), as it has been mentioning that this mechanism is characterized by the difficulty of its application, which formed the main research problem. In home gardens (the sub-problem of research), an analysis of this problem was applied and then a solution was found to address it. The researcher used the 3dsmax program to implement the proposed design.
The most important research res