Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Central Bank of Iraq (CBI) building, and strive to improve the BEP of the CBI building. However, previous studies indicate collaborative work and communications enhance effective BIM implementation, which can improve BIM use by applying a BEP and an AEC (UK) BIM protocol that leads to positive BIM impact. BEP comprises important information and goals related to the intended project, including the BIM collaborative process (process map), information exchange requirements, BIM data management, BIM model management, and quality control, which are considered essential for enhancing BIM collaboration during PLC. This paper concludes that implementing BIM effectively requires overcoming obstacles faced by Iraqi construction projects. Effective BIM implementation requires improving collaboration and communication throughout the construction process, which could be achieved by depending on the BIM Execution Planning Guide(BEP Guide) and the AEC (UK) BIM Protocol 2012 V2.0
The Internet of Things (IoT) technology and smart systems are playing a major role in the advanced developments in the world that take place nowadays, especially in multiple privilege systems. There are many smart systems used in daily human life to serve them and facilitate their tasks, such as alarm systems that work to prevent unwanted events or face detection and recognition systems. The main idea of this work is to capture live video using a connected Pi camera, save it, and unlock the electric strike door in several ways; either automatically by displaying a live video connected via USB webcam using a deep learning algorithm of facial recognition and OpenCV or by RFID technology, as well as by detecting abnormal entrance wit
... Show MoreWater flooding is one of the most important methods used in enhanced production; it was a pioneer method in use, but the development of technology within the oil industry, takes this subject toward another form in the oil production and application in oil fields with all types of oils and oil reservoirs. Now days most of the injection wells directed from the vertical to re-entry of full horizontal wells in order to get full of horizontal wells advantages.
This paper describes the potential benefits for using of re-entry horizontal injection wells as well as combination of re –entry horizontal injection and production wells. Al Qurainat productive sector was selected for study, which is one of the four main productive sectors of Sout
This research has come out with that strategies made by Porter as generally strategies applicable to any size and type of economic units cannot be applied to many of the economic units in the world in generally and in Iraq especially not a lot of economic units have the resources and competencies that enable them to provide a unique product of its kind in the minds of customers and then adopt a differentiation strategy and not a lot of economic units have the resources and competencies that make them the cost leader. Differentiators and cost leaders are minority in the world while not differentiators and not cost leaders are majority in the world.
The economic units are not differentiators and not c
... Show MoreThe function of internal auditing has become an important function that aims at achieving objectives that are compatible with these developments and changes that have occurred in many countries in the world, which required the emergence of professional associations and institutes in the profession of internal auditing. Improve the guideline of the internal audit units issued by the Federal Audit Bureau to enhance the efficiency of internal audit performance in Iraqi government units. The researchers adopted the statistical method of proving the hypothesis by constructing a questionnaire that included three main axes: supporting the senior management in adopting the current guide, and the second being the importance of improving t
... Show MoreHydro cracking of heavy oil is used in refinery to produce invaluable products. In this research, a model of hydro cracking reactor has been used to study the behavior of heavy oil in hydro cracking under the conditions recommended by literature in terms lumping of feed and products. The lumping scheme is based on five lumps include: heavy oil, vacuum oil, distillates, naphtha and gases. The first order kinetics was assumed for the conversion in the model and the system is modeled as an isothermal tubular reactor. MATLAB 6.1 was used to solve the model for a five lump scheme for different values of feed velocity, and temperature.
The unstable and uncertain nature of natural rubber prices makes them highly volatile and prone to outliers, which can have a significant impact on both modeling and forecasting. To tackle this issue, the author recommends a hybrid model that combines the autoregressive (AR) and Generalized Autoregressive Conditional Heteroscedasticity (GARCH) models. The model utilizes the Huber weighting function to ensure the forecast value of rubber prices remains sustainable even in the presence of outliers. The study aims to develop a sustainable model and forecast daily prices for a 12-day period by analyzing 2683 daily price data from Standard Malaysian Rubber Grade 20 (SMR 20) in Malaysia. The analysis incorporates two dispersion measurements (I
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More