Preferred Language
Articles
/
joe-1924
Improving Building Information Modeling (BIM) Implementation throughout the Construction Industry
...Show More Authors

Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Central Bank of Iraq (CBI) building, and strive to improve the BEP of the CBI building. However, previous studies indicate collaborative work and communications enhance effective BIM implementation, which can improve BIM use by applying a BEP and an AEC (UK) BIM protocol that leads to positive BIM impact. BEP comprises important information and goals related to the intended project, including the BIM collaborative process (process map), information exchange requirements, BIM data management, BIM model management, and quality control, which are considered essential for enhancing BIM collaboration during PLC. This paper concludes that implementing BIM effectively requires overcoming obstacles faced by Iraqi construction projects. Effective BIM implementation requires improving collaboration and communication throughout the construction process, which could be achieved by depending on the BIM Execution Planning Guide(BEP Guide) and the AEC (UK) BIM Protocol 2012 V2.0

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 08 2020
Journal Name
Electronic Theses And Dissertations
Improving Nitrogen Management in Potatoes with Active Optical Sensors
...Show More Authors

Nitrogen (N) fertilizer rate is important for high yield and good quality of potato tubers. In this dissertation, I seek to study the response of different potato cultivars under different N fertilizer rates and how that can impact tuber quality, examine the performance of active optical sensors in improving a potato yield prediction algorithm, and evaluate the ability of active optical sensors (GreenSeeker (GS) and Crop Circle (CC)) to optimize a N recommendation algorithm that can be used by potato growers in Maine. This research was conducted at 11 sites over a period of two years (2018–2019) in Aroostook County, Maine; all sites depended on a rainfed system. Three potato cultivars, Russet Burbank, Superior, and Shepody, were planted u

... Show More
View Publication
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (8)
Scopus Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Implementation of a Proposed Load-Shedding System Using Altera DE2 FPGA
...Show More Authors

A load-shedding controller suitable for small to medium size loads is designed and implemented based on preprogrammed priorities and power consumption for individual loads. The main controller decides if a particular load can be switched ON or not according to the amount of available power generation, load consumption and loads priorities. When themaximum allowed power consumption is reached and the user want to deliver power to additional load, the controller will decide if this particular load should be denied receiving power if its priority is low. Otherwise, it can be granted to receive power if its priority is high and in this case lower priority loads are automatically switched OFF in order not to overload the power generation. The

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
DESIGN AND IMPLEMENTATION AN IRAQI CITIES DATABASE USING K-D TREE
...Show More Authors

This research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Implementation of hierarchically porous zeolite-polymer membrane for Chromium ions removal
...Show More Authors
Abstract<p>This work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain</p> ... Show More
View Publication
Scopus (28)
Crossref (17)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Communications And Network
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 17 2022
Journal Name
Journal Of Al-ma'moon College
Simulation and Implementation of SNR Measurement processor for Adaptive Communication Systems
...Show More Authors

Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
Implementation and performance evaluation of multi level pseudo random sequence generator
...Show More Authors

In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between transmitter and receiver. The MLPN provides different pseudo-random sequence lengths. This work provides the ability to implement MLPN practically

... Show More
View Publication
Scopus Crossref