The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire survey was used as a data collection method. The participants in the survey were engineers from the Iraqi construction sector. The sample size was 121 engineers from 34 institutions with multidisciplinary backgrounds. The results showed that the engineers need to develop the training system and merge many methods and techniques in their institution to maximize the benefits using an integration model capable of dealing with the variable environment in construction, especially in developing countries like Iraq.
The purpose of this paper is to show that for a holomorphic and univalent function in class S, an omitted –value transformation yields a class of starlike functions as a rotation transformation of the Koebe function, allowing both the image and rotation of the function
to be connected. Furthermore, these functions have several properties that are not far from a convexity properties. We also show that Pre- Schwarzian derivative is not invariant since the convexity property of the function is so weak.
Information security contributes directly to increase the level of trust between the government’s departments by providing an assurance of confidentiality, integrity, and availability of sensitive governmental information. Many threats that are caused mainly by malicious acts can shutdown the egovernment services. Therefore the governments are urged to implement security in e-government projects.
Some modifications were proposed to the security assessment multi-layer model (Sabri model) to be more comprehensive model and more convenient for the Iraqi government. The proposed model can be used as a tool to assess the level of security readiness of government departments, a checklist for the required security measures and as a commo
n this work, it have earthquakes data been analytized as a result of ground water injection attendant to dig wells and oil, which affects the pressure pores in the rock and is according to cause a medium-sized earthquake that have already occurred more than 20 times. according to the publication of the Department of Attenba, the dangers of earthquakes and movement flooring in Guy-Greenbrie-United area of one of United States of America cities, where these data represent a monitor magnitudes of earthquakes from September 2008 the September 2011, we conducted statistical analysis and create a model for earthquakes flooring that was chosen for four dis-tributions and results i the optima reveal the best distribution is the Burr X11 then Gen
... Show MoreAbstract
Machining residual stresses correlate very closely with the cutting parameters and the tool geometries. This research work aims to investigate the effect of cutting speed, feed rate and depth of cut on the surface residual stress of steel AISI 1045 after face milling operation. After each milling test, the residual stress on the surface of the workpiece was measured by using X-ray diffraction technique. Design of Experiment (DOE) software was employed using the response surface methodology (RSM) technique with a central composite rotatable design to build a mathematical model to determine the relationship between the input variables and the response. The results showed that both
... Show MoreGrey system theory is a multidisciplinary scientific approach, which deals with systems that have partially unknown information (small sample and uncertain information). Grey modeling as an important component of such theory gives successful results with limited amount of data. Grey Models are divided into two types; univariate and multivariate grey models. The univariate grey model with one order derivative equation GM (1,1) is the base stone of the theory, it is considered the time series prediction model but it doesn’t take the relative factors in account. The traditional multivariate grey models GM(1,M) takes those factor in account but it has a complex structure and some defects in " modeling mechanism", "parameter estimation "and "m
... Show MoreThe guarantee of deposits came in most countries as a result of the financial crises faced by the banks, as the role of the guarantee agencies does not end to the point of enabling the depositor to recover his deposit, but rather it is considered necessary to overcome crises and stabilize the banking system.
The decisions related to the coverage determined by the types of guarantee are important, and it is required that these decisions be consistent with the policy of each guarantee to control and limit the negative effects that accompany deposit insurance, in order to face any risk that threatens deposits and confidence in them and to avoid any financial failures for the stability of the banking system and the protection of depo
... Show MoreThe aim of this paper is to introduce the definition of a general fuzzy norned space as a generalization of the notion fuzzy normed space after that some illustrative examples are given then basic properties of this space are investigated and proved.
For example when V and U are two general fuzzy normed spaces then the operator is a general fuzzy continuous at u V if and only if u in V implies S(u) in U.
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreThis Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro
... Show More