The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main method which is used to resolve the claims in the construction project in Iraq. Finally, the proposed claims management system is developed to control the causes of the claims during the preconstruction phase and construction phase.
This paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
A QR code is a type of barcode that can hold more information than the familiar kind scanned at checkouts around the world. The “QR” stands for “Quick Response”, a reference to the speed at which the large amounts of information they contain can be decoded by scanners. They are being widely used for advertising campaigns, linking to company websites, contest sign-up pages and online menus. In this paper, we propose an efficient module to extract QR code from background and solve problem of rotation in case of inaccurate image taken from mobile camera.
Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
There are still areas around the world suffer from severe shortage of freshwater supplies. Desalination technologies are not widely used due to their high energy usage, cost, and environmental damaging effects. In this study, a mathematical model of single-bed adsorption desalination system using silica gel-water as working pair is developed and validated via earlier experiments. A very good match between the model predictions and the experimental results is recorded. The objective is to reveal the factors affecting the productivity of fresh water and cooling effect in the solar adsorption system. The proposed model is setup for solving within the commercially-available software (Engineering Equation Solver). It is implemented to so
... Show MoreNystatin is the drug of choice for treatment of cutaneous fungal infections with main disadvantage that is the need for multiple applications to achieve complete eradication which may reduce patient compliance. Microparticles offer a solution for such issue as they are one of sustained release preparations that achieve slow release of drug over an extended period of time. The objectives of this study were to fabricate nystatin-loaded chitosan microparticles with the ultimate goal of prolonging drug release and to analyze the influence of polymer concentration on various properties of microparticles. Microparticles were prepared by chemical cross-linking method using glutaraldehyde as cross-linking agent. Five formulas, namely N1C1, N1C2,
... Show MoreA load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The
... Show MoreUltra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process o
It is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More