Preferred Language
Articles
/
joe-1924
Improving Building Information Modeling (BIM) Implementation throughout the Construction Industry
...Show More Authors

Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Central Bank of Iraq (CBI) building, and strive to improve the BEP of the CBI building. However, previous studies indicate collaborative work and communications enhance effective BIM implementation, which can improve BIM use by applying a BEP and an AEC (UK) BIM protocol that leads to positive BIM impact. BEP comprises important information and goals related to the intended project, including the BIM collaborative process (process map), information exchange requirements, BIM data management, BIM model management, and quality control, which are considered essential for enhancing BIM collaboration during PLC. This paper concludes that implementing BIM effectively requires overcoming obstacles faced by Iraqi construction projects. Effective BIM implementation requires improving collaboration and communication throughout the construction process, which could be achieved by depending on the BIM Execution Planning Guide(BEP Guide) and the AEC (UK) BIM Protocol 2012 V2.0

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Proposed model for data protection in information systems of government institutions
...Show More Authors

Information systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Vigilance and strategic role in improving the level of nursing services / Applied Research in Ghazi al-Hariri Hospital
...Show More Authors

The current research aims to focus on strategic vigilance dimensions and contained (environmental vigilance, technological vigilance, competitive vigilance, vigilance marketing) to improve nursing services, which include a) the quality, timeliness, problem-solving and decision-making, relationships with others, leadership skills) and measure the degree link and influence between strategic vigilance in the hospital respondent and improve nursing service that the problem of the research lies in the weakness of strategic plans and health organizations in general and the hospital surveyed (martyr Ghazi al-Hariri), in particular, the lack of awareness of the hospital researched strategy vigilant management to improve nursing services,

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Review Of International Geographical Education
Investing Organizational Identity in Improving Work Teams: An Exploratory Study of a Sample of The Capital's Traffic Directorates
...Show More Authors

The research aims to identify the role of organizational identity in improving work teams, and to suggest ways to deal with the outputs of work teams in a way that achieves the goals of the Baghdad Traffic Directorate as it is the subject of the application of the research, while the research community was represented by its officers, while the research sample was embodied in (General Director, Associate The Director General, the directors of Rusafa and Karkh traffic and their assistants, as well as the heads of the divisions and the officials of the departments) in it. The sample was (200) observations. The descriptive exploratory approach was devoted to conducting the research, relying on the questionnaire in data collection, as well as e

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
The Role Of Information Technology In Enhancing Performance Evaluation And Responsibility Accounting (Empirical Study In Jordan Hotels )
...Show More Authors

   This paper suggesting a new modern method to evaluate the performance of hotel industry at Jordan instead of the classical method used by the industry and that is Bench Marking , this method can be done by comparing the performance of hotel industry at two serial years which helps in calculating a standard performance .

  The industry can use this standard to identify the variance, which make the evaluation of performance easier and support the efforts to develop the hotel industry at all levels and enable to give high quality services to customers.

    The study believed that this situation would not be achieved unless the hotel industry will app

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees20
Change detection of the land cover for three decades using remote sensing data and geographic information system
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of systems and information technology on stock market activity: Case study in Iraq stock market
...Show More Authors

Financial markets play an important role in the economy, as it contributes to the financial and economic system of the state stability, as it reduces the adoption of the companies on the loans granted by the banks, as financial markets contribute to attracting and channeling savings to small savers who will be able to buy a number of shares proportional to their savings, It also provides them the place of exchange, and play technology and information systems an important role in facilitating exchanges and increased market activity, in this research touched on the importance of information technology in effect on the activity of the financial markets. Research is divided into three demands of the first concept of eating and the importance

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Al–bahith Al–a'alami
Axiology of Electronic programs in updating the methodology of information and communication sciences Tropes 8.4 Case Study
...Show More Authors

The study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
American Standard Code for Information Interchange mapping technique for text hiding in the RGB and gray images
...Show More Authors

Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Estimation the blast wave pressure effecters by apply Remote Sensing (RS) and Geographic Information System (GIS) techniques
...Show More Authors

After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref