Preferred Language
Articles
/
joe-187
Identificatio n Of Key Factors Affecting Waste Management In Life Cycle Of The Construction Project By Using Delphi Technique
...Show More Authors

The problem of generated waste as a result of the implementation of construction projects, has  been aggravated recently because of construction activity experienced by the world, especially Iraq, which is going through a period of reconstruction, where construction waste represents (20-40%) of the total generated waste and has a negative effect on the environment and economic side of the project. In addition, the rate of consumpted  amounts of natural resources are estimated to be about 40% in the construction industry, so it became necessary to reduce waste and to be manage well. This study aims to identify the key factors affecting waste management through the various phases of the project, and this is accomplished by using the Delphi technique. After conducting three questionnaire rounds of the Delphi to a group of experts, the results of this study identified forty four key factors affecting waste management distributed on the phases of the project, where found that the factor of frequent errors in the designs has the highest effect on the design phase, and the factor of the use of construction techniques that do not generate waste has highest effect on the construction phase. The purpose is to provide data base for decision-makers to control waste management well to avoid all affecting factors, with the possibility of building waste management system based on factors effective for each phase.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Different methods for characterizing surface roughness using laser speckle technique
...Show More Authors

In this work, results from an optical technique (laser speckle technique) for measuring surface roughness was done by using statistical properties of speckle pattern from the point of view of computer image texture analysis. Four calibration relationships were used to cover wide range of measurement with the same laser speckle technique. The first one is based on intensity contrast of the speckle, the second is based on analysis of speckle binary image,  the third is on size of speckle pattern spot, and the latest one is based on characterization of the energy feature of the gray level co-occurrence matrices for the speckle pattern. By these calibration relationships surface roughness of an object surface can be evaluated within the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Turkish Journal Of Computer And Mathematics Education
Analysis of the content of the applied fifth grade chemistry book according to life skills
...Show More Authors

The current research aims to analyze the chemistry books for the preparatory stage according to life skills for the academic year (2019-2020) and to know the life skills contained in the chemistry books for the preparatory stage through the following two questions:1-What life skills should be available in the content of chemistry books prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year(2019-2020). 2-What is the percentage of life skills included in the content of chemistry textbooks prescribed for middle school students approved by the Ministry of Education, General Directorate of Curricula in the academic year (2019-2020). To achieve the objectives of the resea

... Show More
Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Gene Reports
Genotyping of Human Cytomegalovirus Glycoprotein N in Iraqi Breast cancer Patients
...Show More Authors

Human Cytomegalovirus (HCMV) is an enveloped ubiquitous ds-DNA virus that has been implicated in several types of malignancies. The current work was conducted in the period extending from (November 2018 to the end of October 2019) and aimed to assess the frequency of glycoprotein N (gN) genotypes of HCMV. A total number of 91serum and plasma specimens were collected to fulfill this purpose from females (71 breast cancer patients, and a control group of 20 females) attending Al-Amal hospital for cancer management and Baghdad teaching hospital. The molecular part of this data was achieved through both PCR and Multiplex PCR for detection of HCMV gN (UL73) entire gene as well as for genotyping. gN was detected in 36/71 (50.7%) of breast cancer

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study the Characteristic Performance of Trickling Filter for Pharmaceutical Waste Treatment
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Journal Of Engineering
A Review of the Asphalt Mixtures Containing Recycled Solid Waste Materials
...Show More Authors

Landfill and incineration are the most common and widely used methods to dispose of solid wastes; both of these techniques are considered the main sources of pollution in the world due to the harmful toxic emissions that are considered an environmental problem. Because of the large areas used by landfills, they are not always considered an economical method. With the increase in the production of solid materials, solid wastes increase the pressure on incinerators and landfills, making the environmental pollution hazard more serious. Instead, these waste materials can be used in some other applications. One of the most important of these applications is asphalt pavements, which are the most used types of pavements in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref