Preferred Language
Articles
/
joe-2571
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)
...Show More Authors

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and to improve the current performance of project management and execution. The suggested system principles and fundamentals, benefits, features, classification and types, and the different solutions are described to ease and improve the process of development, adoption, and implementation of the system. The results show that the proposed system can improve the performance of the current state of project management through improving the processes of information and communication management.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (28)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

     Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3rd  level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
A study to determine the most important factors affecting student performance In the secondary school in Diwaniya
...Show More Authors

Student performance may influence by several factors in all his study levels such as primary school, intermediate school and even in his college; some of these factors are psychological factors, social factors, and the factors which correlate with student environment.

In this paper we study some of these factors to discover their influence by using canonical correlation analysis to analyze the data. Many conclusions are discovered to help who focuses student performance or to make it pest in future.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 12 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Effect of Crystallization Time and Acid Type on the Synthesis of Nano-Gamma Alumina Using Double Hydrothermal Method
...Show More Authors

Double hydrothermal method was used to prepare nano gamma alumina   using aluminum nitrate nano hydrate and sodium aluminate as an aluminum source, CTAB (cetyltrimethylammonium bromide) as surfactant, and variable acids: weak acids like; citric, and acitic acids, and strong acids like; hydrochloric and nitric acids as a bridge between aluminum salts and surfactant. Different crystallization times  12, 24, 48, and 72 hrs were applied. All the batches were prepared at pH equals to 9. XRD diffraction technique was used to investigate the crystalline nano gamma alumina pure from surfactant. N2 adsorption-desorption (BET) was used to measure the surface area and pore volume of the prepared nano alumina, the average p

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 13 2026
Journal Name
Al-fatih Journal
The impact of the use of mirrors in the level of performance of some skills epeeEmpirical researchStudents on the third stage in the Faculty of Physical Education for Girls
...Show More Authors

يهدف البحث الى أعداد بعض تمرينات الاساسية لسلاح الشيش بأستخدام المرايا في تطوير قدرة مستوى تعلم الطالبات في المبارزة ومعرفة الفروق بين المجموعتين التجريبي والضابطة بتأثير استخدام المرايا في مستوى اداء بعض مهارات سلاح الشيش لطالبات المرحلة الثالثة , وقد أستخدمت الباحثتان المنهج التجريبي على عينة من طالبات المرحلة الثالثة , وقد بلغ عددهم (45) طالبة , وقد خرجت الباحثتين بعدة أستنتاجات وهي:- - أن المنهاج التعليمي

... Show More
View Publication
Publication Date
Tue Jul 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Classification and monitoring of autism using svm and vmcm
...Show More Authors

Autism is a lifelong developmental deficit that affects how people perceive the world and interact with each others. An estimated one in more than 100 people has autism. Autism affects almost four times as many boys than girls. The commonly used tools for analyzing the dataset of autism are FMRI, EEG, and more recently "eye tracking". A preliminary study on eye tracking trajectories of patients studied, showed a rudimentary statistical analysis (principal component analysis) provides interesting results on the statistical parameters that are studied such as the time spent in a region of interest. Another study, involving tools from Euclidean geometry and non-Euclidean, the trajectory of eye patients also showed interesting results. In this

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Geotechnical Engineering And Sustainable Construction
Stability and Seismic Performance of Tall Steel Structures with Hybrid Energy Absorbers Including P-Delta Effect
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref