Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost and time) for the maintenance of wastewater projects. The output shows there is a high correlation (R) between real and expected cost with 95.4%, minimized testing error (8.5%), and training error (19%). The mean absolute present error (MAPE) and Average Accuracy Percentage (AA) are (13.9% and 86.1%) respectively. Also, the results showed a strong correlation (R) between actual and predicted time (99.1%), minimized testing error (8%), and an additional MAPE% and AA% with (11.7% and 88.3%) respectively. These models are in agreement with the real values, as well as gives good prediction for future maintenance projects.
Project management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreAbstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreTeaching through the system of personal learning, known as (Clare's plan) is amongst the most prominent plans which depend on self-education, as it received worldwide recognition. The plan lets the learner achieve learning by depending on himself after being familiar with the educational goals given to him, then he starts to solve the exercises and the drills accompanying the unit. After that, he checks his achievement by answering the self-evaluation tests. This method offers more opportunities for personal interaction than do the traditional systems, and individual leaning is a methodical expression aims at taking care of the learner and making him the locus of the processes of teaching and learning.
Aims of the study
... Show MoreThree stations were chosen on the water treatment plan of al- madaan .The Samples collected from the (Raw water) and the Sedimentation, filtration and storage water and the drinking water of outlet. Coliform densities T.S and F.C and TS and F.S and total bacterial count as bacteriological pollution indicators, as moste probable number (MPN) method was studied in test. Also some of the chemical characteristics of the water like pH , total suspended solid T.S.S, T.D.D.and S04 , T.Hardness , Ca++ , Mg++ . From the results it were indicated . The study showed the drinking water of outlet (distriputed in system) was agree with WHO criteria and Iraqi limits standards .
This study aims to simulate and assess the hydraulic characteristics and residual chlorine in the water supply network of a selected area in Al-Najaf City using WaterGEMS software. Field and laboratory work were conducted to measure the pressure heads and velocities, and water was sampled from different sites in the network and then tested to estimate chlorine residual. Records and field measurements were utilized to validate WaterGEMS software. Good agreement was obtained between the observed and predicted values of pressure with RMSE range between 0.09–0.17 and 0.08–0.09 for chlorine residual. The results of the analysis of water distribution systems (WDS) during maximum demand
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More