This study examines the causes of time delays and cost overruns in a selection of thirty post-disaster reconstruction projects in Iraq. Although delay factors have been studied in many countries and contexts, little data exists from countries under the conditions characterizing Iraq during the last 10-15 years. A case study approach was used, with thirty construction projects of different types and sizes selected from the Baghdad region. Project data was gathered from a survey which was used to build statistical relationships between time and cost delay ratios and delay factors in post disaster projects. The most important delay factors identified were contractor failure, redesigning of designs/plans and change orders, security issues, selection of low-price bids, weather factors, and owner failures. Some of these are in line with findings from similar studies in other countries and regions, but some are unique to the Iraqi project sample, such as security issues and low-price bid selection. While many studies have examined factors causing delays and cost overruns, this study offers unique insights into factors that need to be considered when implementing projects for post disaster emergency reconstruction in areas impacted by wars and terrorism.
The current study examined the impact of using PowerPoint presentation on EFL student’s attendance, achievement and engagement. To achieve the aim of this study, three null hypotheses have been posed as follows: There is no statistically significant difference between the mean score of the experimental group attendance and that of the control one; there is no statistically significant difference between the mean score of the experimental group achievement and that of the control one, and there is no statistically significant difference between the mean score of the experimental group engagement and that of the control one. To verify a hypothesis, a sample of sixty students is chosen randomly from the third year, department of English,
... Show MoreQuadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der
... Show MoreIn this research, the effect of reinforcing epoxy resin composites with a filler derived from chopped agriculture waste from oil palm (OP). Epoxy/OP composites were formed by dispersing (1, 3, 5, and 10 wt%) OP filler using a high-speed mechanical stirrer utilizing a hand lay-up method. The effect of adding zinc oxide (ZnO) nanoparticles, with an average size of 10-30 nm, with different wt% (1,2,3, and 5wt%) to the epoxy/oil palm composite, on the behavior of an epoxy/oil palm composite was studied with different ratios (1,2,3, and 5wt%) and an average size of 10-30 nm. Fourier Transform Infrared (FTIR) spectrometry and mechanical properties (tensile, impact, hardness, and wear rate) were used to examine the composites. The FTIR
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show MoreBackground: Differentiation between malignant and benign vertebral compression fracture is often problematic. This is precisely difficult in elderly who are predisposed to benign compression caused by osteoporosis .Establishing correct diagnosis is of great importance in determining the treatment andprognosis.A study was performed to determine which magnetic resonance imaging findings are useful in discrimination between metastatic and acute osteoporotic compression fractures of the spine. Recently MRI is being increasingly used for evaluation of these fractures.Objectives: The aim of this study is to establish the correct diagnosis of malignant and benign compression vertebral fracture by MRI to determine treatment and prognosis.Methods
... Show MoreThe present study aims at examining quantitatively the morphometric characteristics of Iziana Valley basin that is located in the northern part of Iraq; particularly in south of Erbil Governorate. This basin is considered one of the small sub-basins where its valleys run on formations of the Triple and Quadrant Ages, which are represented by the Bay Hassan formations, and the sediments and mixed sediments of the cliffs, respectively. The area of the Iziana basin amounts to (36.39 km2) whereas the percentage of its rotation reaches (0.17); a low percentage, which indicates that the basin diverges from the circular to the rectangular shape. The value of the elongation ratio of the basin reaches (0.38) while the terrain rat
... Show MoreIn this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
Biosorption is an effective method to remove toxic metals from wastewaters. In this study biosorption of lead and chromium ions from solution was studied using Citrobacter freundii and Citrobacter kosari isolated from industrial wastewater. The experimental results showed that optimum grwoth temperature for both bacteria is 30oC and the optimum pH is 7 &6 for C. freundii and C. kosari respectively. While the optimum incubation period to remove Pb and Cr for C. freundii and C. kosari is 4 days and 3days respectively. Also the biosorption of Pb and Cr in mixed culture of bacteria and mixed culture of Pb and Cr was investigated. Result indicate that uptake of Cr and Pb for C.freundii, C. kosari and in mixes culture of both bacteria is 58%, 53%
... Show More