Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Central Bank of Iraq (CBI) building, and strive to improve the BEP of the CBI building. However, previous studies indicate collaborative work and communications enhance effective BIM implementation, which can improve BIM use by applying a BEP and an AEC (UK) BIM protocol that leads to positive BIM impact. BEP comprises important information and goals related to the intended project, including the BIM collaborative process (process map), information exchange requirements, BIM data management, BIM model management, and quality control, which are considered essential for enhancing BIM collaboration during PLC. This paper concludes that implementing BIM effectively requires overcoming obstacles faced by Iraqi construction projects. Effective BIM implementation requires improving collaboration and communication throughout the construction process, which could be achieved by depending on the BIM Execution Planning Guide(BEP Guide) and the AEC (UK) BIM Protocol 2012 V2.0
With the increase in industry and industrial products, quantities of waste have increased worldwide, especially plastic waste, as plastic pollution is considered one of the wastes of the modern era that threatens the environment and living organisms. On this basis, a solution must be found to use this waste and recycle it safely so that it does not threaten the environment. Therefore, this research used plastic waste as an improvement material for clay soil. In this research, two types of tests were conducted, the first of which was a laboratory test, where the undrained shear strength (cohesion), compression index (Cc), and swelling index (Cr) of the improved and unimproved soils were calculated (plastic was added in pr
... Show MoreIndustries copper a craft that requires precision and patience great in the processes of industrialization and execution of product launches brass designs and a variety of forms , and the goal of research into the possibility of the use of modern technologies in the development of industries copper local , and identifies research study models of industries copper local to the city of Baghdad , and are available in the markets for the period from (200 - 2011) , Chapter II Multi industries copper local and technical in the copper industry , and after analysis models the sample was the most important conclusions : can work forms a multi- product copper formations deep or window using the technique work motifs and patterns. - formations deco
... Show MoreSports risk has become a threat to the sports sector in general and the impact on an efficient player and the old stadiums in particular. So have such a thing fertile ground of global insurance companies to exploit it optimally exploited through the development and marketing of insurance lids for the provision of protection for athletes of different risks they may face, which contributed to the growth and development of the performance of these companies and helped in the emergence of sports insurance specialist firms. And through the insurance process in the field of sports and where the insurance is a type of social solidarity. The main problem is this spirit manifested search in question is whether to embrace sports institutions sport
... Show MoreIn this paper a decoder of binary BCH code is implemented using a PIC microcontroller for code length n=127 bits with multiple error correction capability, the results are presented for correcting errors up to 13 errors. The Berkelam-Massey decoding algorithm was chosen for its efficiency. The microcontroller PIC18f45k22 was chosen for the implementation and programmed using assembly language to achieve highest performance. This makes the BCH decoder implementable as a low cost module that can be used as a part of larger systems. The performance evaluation is presented in terms of total number of instructions and the bit rate.
he public federal budget of the state includes estimated figures for state revenues and expenditures for the next fiscal year. The estimation process is one of the main parts of the preparation of the general budget of the state and the accuracy in the estimation of revenues and expenditures of the most important principles that should be based on the process of making estimates and should not overestimate the assessment process to ensure the availability of funds in the future in all cases, which lead to unfair distribution of allocations, so the research aims to study The case of preparing the budget in the Directorate and how to estimate the expenditure in, by the analysis of operating budgets and identify deviations in the implementa
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More