Preferred Language
Articles
/
joe-1568
Use Risk Score Method to Identify the Qualitative Risk Analysis Criteria in Tendering Phase in Construction Projects
...Show More Authors

The purpose of this article was to identify and assess the importance of risk factors in the tendering phase of construction projects. The construction project cannot succeed without the identification and categorization of these risk elements. In this article, a questionnaire for likelihood and impact was designed and distributed to a panel of specialists to analyze risk factors. The risk matrix was also used to research, explore, and identify the risks that influence the tendering phase of construction projects. The probability and impact values assigned to risk are used to calculate the risk's score. A risk matrix is created by combining probability and impact criteria. To determine the main risk elements for the tender phase of a construction project, this study constructed the matrix of probability and impact variables and put the periods based on the risk score. Finally, this study identified a fourth main risk group and twenty-two sub-risk factors that are appropriate for the tendering phase of construction projects in Iraq

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Treatment of Furfural Wastewater by (AOPs) Photo-Fenton Method
...Show More Authors

The objective of this study is to investigate the application of advanced oxidation processes (AOPs) in the treatment of wastewater contaminated with furfural. The AOPs investigated is the homogeneous photo-Fenton (UV/H2O2/Fe+2) process. The experiments were conducted by using cylindrical stainless steel batch photo-reactor. The influence of different variables: initial concentration of H2O2 (300-1300mg/L), Fe+2(20-70mg/L), pH(2-7) and initial concentration of furfural (50-300 mg/L) and their relationship with the mineralization efficiency were studied.

 Complete mineralization for the system UV/H2O2/Fe+2 was achieved at: initi

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Al-nahrain Journal Of Science
Modified third order iterative method for solving nonlinear equations
...Show More Authors

Many numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.

Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Gender Recognition Using a Multilayer Feature Extraction Method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 16 2025
Journal Name
Journal Of Engineering
Computational Method for Unsteady Motion of Two-Dimensional Airfoil
...Show More Authors

A numerical method is developed for calculation of the wake geometry and aerodynamic forces on two-dimensional airfoil under going an arbitrary unsteady motion in an inviscid incompressible flow (panel method). The method is applied to sudden change in airfoil incidence angle and airfoil oscillations at high reduced frequency. The effect of non-linear wake on the unsteady aerodynamic properties and oscillatory amplitude on wake rollup and aerodynamic forces has been studied. The results of the present method shows good accuracy as compared with flat plate and for unsteady motion with heaving and pitching oscillation the present method also shows good trend with the experimental results taken from published data. The method shows good result

... Show More
View Publication
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Satellite image classification using proposed singular value decomposition method
...Show More Authors

In this work, satellite images for Razaza Lake and the surrounding area
district in Karbala province are classified for years 1990,1999 and
2014 using two software programming (MATLAB 7.12 and ERDAS
imagine 2014). Proposed unsupervised and supervised method of
classification using MATLAB software have been used; these are
mean value and Singular Value Decomposition respectively. While
unsupervised (K-Means) and supervised (Maximum likelihood
Classifier) method are utilized using ERDAS imagine, in order to get
most accurate results and then compare these results of each method
and calculate the changes that taken place in years 1999 and 2014;
comparing with 1990. The results from classification indicated that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ecological Engineering
Cadmium Removal from Contaminated Soil by Electro-Kinetic Method
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Evaluation Method of Mesh Protocol over ESP32 and ESP8266
...Show More Authors

Internet of Things (IoT) is one of the newest matters in both industry and academia of the communication engineering world. On the other hand, wireless mesh networks, a network topology that has been debate for decades that haven’t been put into use in great scale, can make a transformation when it arises to the network in the IoT world nowadays. A Mesh IoT network is a local network architecture in which linked devices cooperate and route data using a specified protocol. Typically, IoT devices exchange sensor data by connecting to an IoT gateway. However, there are certain limitations if it involves to large number of sensors and the data that should be received is difficult to analyze. The aim of the work here is to implement a self-

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref