Green buildings are considered more efficient than traditional buildings due to the incorporated techniques and the multidisciplinary specializations required to comply with their specifications, in addition to the advanced commissioning, which undergoes before handing over the buildings to the owners to ensure requirements conformance. As a result, the appropriate selection of a project delivery system acts as the essential factor that affects the performance of the project. This research aims at building a system that helps to select the best method to implement green buildings. Through studying the recent research approaches in project delivery systems, the factors that affect the selection of the optimal implementation method for green buildings have been identified; expert interviews have been done to study and analyze the main influential factors that affect the selection of the best method for implementing green buildings. The results of interviews indicate that the main influential factors are as follows: The occurrence of economic crises in the country, availability of financial capacity for the contractor and the owner, the lack of previous experience in similar projects, hiring an incompetent contractor, differences between design drawings among all disciplines, and providing qualified contractors, subcontractors, suppliers and craftsmen with sufficient qualifications early in the project. Depending on these main factors, a software system is built to choose the best delivery system for green building projects. This research encourages future works to focus on the quality and performance of green buildings and lays out the foundation for academic researchers to explore new techniques for evaluating the project delivery systems as well as supporting the decision-makers to choose the best.
TI1e Web service securi ty challenge is to understand and assess the risk involved in securing a web-based service today, based on our existing security technology, and at the same time tmck emerging standards and understand how they will be used to offset the risk in
new web services. Any security model must i llustrate how data can
now through an application and network topology to meet the
requirements defined by the busi ness wi thout exposing the data to undue risk. In this paper we propose &n
... Show MoreThis research deals with a very important subject as it tries to change the theoretical and scientific heritage and some professional rules adopted in the newsroom. Most media students have difficulties in writing news for press correctly. The researcher tries to identify the compatibility of what is published in local news agencies with professional and academic standards.
The research finds detailed editorial rules for a number of news formats which will play an important role in writing news for press easily, especially for the beginners and newcomers. Also, it discovers a new fact denying the beliefs of some researchers and writers in not having news conclusion in news edited according to the inverted pyramid pattern.
The re
Leiomyosarcoma (smooth muscle tumor) is a rare type of a malignant neoplasm of smooth
muscle. It is a resistant cancer, generally not very responsive to chemotherapy, radiationand surgery.The
aim of this study was to evaluate photodynamic therapy (PDT) as a possible basis for treatment using
(650 nm)diode laser with methyleneblue (MB) as a photosensitizer on leiomyosarcoma (LMS)cell line
(L20B) in vitro. The cytotoxic effects of 650nm diode laser 0.052 W/cm2 (power density) at different
exposure time (10, 20, and 30 min) with methylene blue at different concentrations (0.01% ,0.1 % ,1%)
was investigated on LMS cell line (L20 B). The cytotoxic effect of laser was increased with increasing
irradiation time for a certai
One of the most critical functions of the government is the devising and planning for the Public Budget for the coming years. Studying any budget of any given state would directly reflect on its intentions and collective direction during a certain time span. Since all allocations represent the government's agenda and time plan for coming years. And the size of each allocation would measure the priority of each budgetary item. Because of the eminent importance of the public budget planning in Iraq, a country of abundant riches and human resources that flow in the national economy, we present this research that would cover the resources versus expenditures of Iraq's public budget endured by the government to sustain its various sec
... Show MoreAbstract: The natural dye, Curcumin, was extracted from Curcuma longa using as a sensitizer in two types of dye sensitized solar cell (DSSC), and their characteristics were studied. The absorption spectrum of the dye solutions, as well as the wavelength of the maximum absorbance of the dye loaded TiO2 film has been studied. The X-Ray diffraction pattern of TiO2 film made with Doctor-Blading technique shown that the grain size of TiO2 was equal to be 40 nm. The electrical performances in terms of short circuit current, open circuit voltage and power conversion efficiency of cells were investigated.
Summary money-laundering has been one of the most serious crimes affecting the national economy, including the private business sector, and it affects the moral system of society, as the beneficiaries of this process become the owners of the money-launderers that contribute to the investment activity by accumulating their accumulated wealth from Illegal economic activity. The biggest burden of money laundering is on banks, as they are the main channel in which money launderers pour their money, especially under bank secrecy laws, and banks are the first balaka in the fight against money laundering, in order to protect themselves from the risks Financial and legal responsibility for their participation in such operations, and certainly money
... Show MoreA new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.
Many image processing and machine learning applications require sufficient image feature selection and representation. This can be achieved by imitating human ability to process visual information. One such ability is that human eyes are much more sensitive to changes in the intensity (luminance) than the color information. In this paper, we present how to exploit luminance information, organized in a pyramid structure, to transfer properties between two images. Two applications are presented to demonstrate the results of using luminance channel in the similarity metric of two images. These are image generation; where a target image is to be generated from a source one, and image colorization; where color information is to be browsed from o
... Show MoreA new mathematical model describing the motion of manned maneuvering targets is presented. This model is simple to be implemented and closely represents the motion of maneuvering targets. The target maneuver or acceleration is correlated in time. Optimal Kalman filter is used as a tracking filter which results in effective tracker that prevents the loss of track or filter divergency that often occurs with conventional tracking filter when the target performs a moderate or heavy maneuver. Computer simulation studies show that the proposed tracker provides sufficient accuracy.
The purpose of this research is to analyze the relationship between the emotional intelligence and the leadership personality of the managers . the research was tested at the college of administration and economics – university of Baghdad through applying it on a sample of (67) members and units of the college. a questionnaire was used as a major tool for collecting data and information . for the purpose of researching to conclusion, the research aimed to test two main hypotheses related to the correlation coefficient and the effect correlation between the two main variable of the research, some statistical techniques such as (the mean, student deviation, percentages, correlation coefficient spearman, simple regression) were us
... Show More