This research takes up address the practical side by taking case studies for construction projects that include the various Iraqi governorates, as it includes conducting a field survey to identify the impact of parametric costs on construction projects and compare them with what was reached during the analysis and the extent of their validity and accuracy, as well as adopting the approach of personal interviews to know the reality of the state of construction projects. The results showed, after comparing field data and its measurement in construction projects for the sectors (public and private), the correlation between the expected and actual cost change was (97.8%), and this means that the data can be adopted in the research study of the integration of parametric costs in a predictive model for future study. Changes in the parametric costs of construction projects substantially impact their time, cost, and quality and are a major barrier to their execution, necessitating research, analysis, and the development of the most effective solutions. The study aims to identify the parametric cost accurately through iterative tests and continuous improvements by presenting literature describing the history and characteristics of the parametric cost methodologies and identifying each methodology's limitations, strengths, and weaknesses to promote a better understanding of their best practices and use for managing project cost
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA simple and accurate method to determinate furosemide (FUR) based on converting the secondary amine to primary amine with acidic hydrolysis then azotization by nitrous acid and coupled with resorcinol as a coupling agent in aqueous medium at pH 13. The optical characteristic like beers law limit found to be (0.25-2.5) μg.ml−1, detection and quantification limits (0.0196) (0.0654) μg.ml−1respectivly and Sandel sensitivity was 0.006738 μg.cm−2. The least-square method was used to evaluate the regression equation and the correlation coefficient. The resulted azo dye has a maximum absorbance at 430 nm with light oran
Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreA modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.
This paper describes DC motor speed control based on optimal Linear Quadratic Regulator (LQR) technique. Controller's objective is to maintain the speed of rotation of the motor shaft with a particular step response.The controller is modeled in MATLAB environment, the simulation results show that the proposed controller gives better performance and less settling time when compared with the traditional PID controller.
An integrated GIS-VBA (Geographical Information System – Visual Basic for Application), model is developed for selecting an optimum water harvesting dam location among an available locations in a watershed. The proposed model allows quick and precise estimation of an adopted weighted objective function for each selected location. In addition to that for each location, a different dam height is used as a nominee for optimum selection. The VBA model includes an optimization model with a weighted objective function that includes beneficiary items (positive) , such as the available storage , the dam height allowed by the site as an indicator for the potential of hydroelectric power generation , the rainfall rate as a source of water . In a
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreBuilding a 3D geological model from field and subsurface data is a typical task in
geological studies involving natural resource evaluation and hazard assessment. In
this paper a 3D geological model for Asmari Reservoir in Fauqi oil field has been
built using petrel software. Asmari Reservoir belongs to (Oligocene- Lower
Miocene), it represents the second reservoir products after Mishrif Reservoir in Fauqi
field. Five wells namely FQ6, FQ7, FQ15, FQ20, FQ21 have been selected lying in
Missan governorate in order to build Structural and petrophysical (porosity and water
saturation) models represented by a 3D static geological model in three directions
.Structural model shows that Fauqi oil field represents un cylin
This study seeks to address the impact of marketing knowledge dimensions (product, price, promotion, distribution) on the organizational performance in relation to a number of variables which are (efficiency, effectiveness, market share, customer satisfaction), and seeks to reveal the role of marketing knowledge in organizational performance.
In order to achieve the objective of the study the researcher has adopted a hypothetical model that reflects the logical relationships between the variables of the study. In order to reveal the nature of these relationships, several hypotheses have been presented as tentative solutions and this study seeks to verify the validity of these hypotheses.
... Show More