Preferred Language
Articles
/
joe-1584
Assessment Strategies of Fixed Firefighting system in Residential Multi-Story Building for Improving Fire Safety: A Review
...Show More Authors

A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. These solutions provide substantial distinction in terms of performance and hence safety. Not only is the availability of different fire risk alleviation systems important, but so is the election of the most convenient solution for the job. This is typically seen inside regulatory procedures and basics of thumb or heuristics and depends on the knowledge and expertise of divergent specialists. When several perceived danger and results thresholds are surpassed, fixed firefighting systems are frequently included as extra fire protection and resilience measures

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of an Automatic Control for Two Axis Tracking System for Applications of Concentrated Solar Thermal Power
...Show More Authors

The present work presents design and implementation of an automated two-axis solar tracking system using local materials with minimum cost, light weight and reliable structure. The tracking system consists of two parts, mechanical units (fixed and moving parts) and control units (four LDR sensors and Arduino UNO microcontroller to control two DC servomotors). The tracking system was fitted and assembled together with a parabolic trough solar concentrator (PTSC) system to move it according to information come from the sensors so as to keep the PTSC always perpendicular to sun rays. The experimental tests have been done on the PTSC system to investigate its thermal performance in two cases, with tracking system (case 1) and without trackin

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Comparing the Design Alternatives Using Building Information Model (BIM) and Constructability in Iraqi Construction Projects
...Show More Authors

The Iraqi construction industry suffers from many issues that lead to many design errors, clashes, delays and cost overruns. Therefore, applying constructability will prevent these issues from happening, as it has proven its positive effect in different projects around the world. The goal of this paper is to use building information modelling (BIM) to assess the constructability, provide the opportunities for the project stakeholders to choose the best constructable design alternative and find the affection of applying constructability on project cost. The practical side of this research consists of two parts: in the first part, 37 factors are collected from the literature review as factors that effect on constructability. After tha

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Narrative infrastructure and its impact on building open and closed endings in the feature film
...Show More Authors

The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Importance of Effort and its Impact in Building the Society in the Light of the Holy Book and Sunna
...Show More Authors

The Importance of Effort and its Impact in Building the Society in the Light of
the Holy Book and Sunna.
Thank for God and peace be upon Prophet Muhammad, His hose hold and
Companions.
This research is to refute a fault : that Islam as a religioncalls for laziness and
dependence and this in first, Second, to show the originality of the Islamic method in
building and construction.
This research Starts with an introduction in which I refer to the nature of the
Islamic method and its way of work in life: that it is a divine method that is achieved
by the effort of the people them selfves and not through a divine extraordinary power:
The research explains the shift in the peoples life who were addressed by this<

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
Assessment of the Awareness of COVID-19 among the Students Enrolled in Different Medical Universities of Pakistan: A Cross Sectional Survey
...Show More Authors

Background: The study was designed for the assessment of the knowledge of medical students regarding pandemics. In the current designed study, the level of awareness was checked and the majority of students were found aware of SARS-CoV and SARS-Cov2 (Covid-19).

Objective: To assess the awareness of SARS-CoV and SARS-Cov2 (Covid-19) among medical students of Pakistan.

Subjects and Methods: A cross-sectional survey was carried out in different universities of Pakistan from May to August 2020. A self-constructed questionnaire by Pursuing the clinical and community administration of COVID-19 given by the National Health Commission of the People's Republic of China was used am

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Employ of Public Relations in Building Awareness of Security against Terrorism A Survey of the Employees of the Directorate General of Public Relations and Media at the Ministry of Interior
...Show More Authors

This study aims at identifying the role played by Public Relations in the field of security awareness of the dangers of terrorism. The research is directed to the employees at the Directorate General of Public Relations and Media at the Ministry of Interior. And that on the basis that those who play an important role in the security awareness are the security institutions, primarily the Ministry of Interior, since this Directorate is responsible for all subjects related to the public security using public relations science. It aims at identifying the functions, methods and communication tools used by the Directorate to raise awareness about the dangers of terrorism. In order to achieve the research objectives, the researcher uses the sur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 29 2024
Journal Name
International Journal Of Design &amp; Nature And Ecodynamics
Artificial Neural Network Assessment of Groundwater Quality for Agricultural Use in Babylon City: An Evaluation of Salinity and Ionic Composition
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Surgical Case Reports
Agenesis of flexor pollicis longus without thenar hypoplasia: a case report and literature review
...Show More Authors
Abstract<p>We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref