This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and to improve the current performance of project management and execution. The suggested system principles and fundamentals, benefits, features, classification and types, and the different solutions are described to ease and improve the process of development, adoption, and implementation of the system. The results show that the proposed system can improve the performance of the current state of project management through improving the processes of information and communication management.
Autorías: Nuha Mohsin Dhahi, Muhammad Hamza Shihab. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 6, 2022. Artículo de Revista en Dialnet.
Abstract:
The aim of this research to try to determine the type of expected relationship between inflation as the explanatory variable and market performance as a dependent variable, for that used data issued and published by the Central Bank of Iraq and the Iraqi Stock Exchange for a sample consisting of (159) observations using the intentional or intentional sampling method for the period extending between the months (January 2010 to March 2023), in the light of each of the Consumer Price Index (CPI), the Iraqi Stock Exchange Index, the number of traded shares and the number of market capital shares to ex
... Show MoreThe research aims at recognition of The rate of performing tasks done by the scientific committees in the scientific departments in the University of Baghdad, within the evaluative perspective of the departments’ Heads. To find any statistically significant differences in the responses of the research sample to the rates performance of the scientific committees in scientific departments in the University of Baghdad, within the evaluative perspective of the departments’ Heads, according to the two variables of the social gender; male and females, and field of specialization of Scientific and Humanities. The research sample consisted if (107) heads of the scientific department in the University of Baghdad. The researchers designed a
... Show More<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
Cooperation spectrum sensing in cognitive radio networks has an analogy to a distributed decision in wireless sensor networks, where each sensor make local decision and those decision result are reported to a fusion center to give the final decision according to some fusion rules. In this paper the performance of cooperative spectrum sensing examines using new optimization strategy to find optimal weight and threshold curves that enables each secondary user senses the spectrum environment independently according to a floating threshold with respect to his local environment. Our proposed approach depends on proving the convexity of the famous optimization problem in cooperative spectrum sensing that stated maximizing the probability of detec
... Show MoreExperimental and theoretical investigations are presented on flocculation process in pulsator clarifier. Experimental system was designed to study the factors that affecting the performance of pulsator clarifier. These factors were water level in vacuum chamber which range from 60 to 150 cm , rising time of water in vacuum chamber which having times of 20,30 & 40 seconds , and sludge blanket height which having heights of 20,30 & 40 cm .The turbidity and pH of raw water used were 200 NTU and 8.13 respectively. According to the jar test, the alum dose required for this turbidity was 20 mg/l .The performance parameters of pulsator clarifier such as , turbidity ,total solid TS , shear rate , volume concentration of sludge blanket an
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show More
