Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implemented to demonstrate the accuracy and usefulness of the proposed delay analysis model. The results of the study indicate that the outcomes of delay analyses are often not predictable that each method may yield different results. The study also revealed that depending on the time and resources available, and the accessibility of project control documentation, one method may be more practical or cost-effective.
This research reports an error analysis of close-range measurements from a Stonex X300 laser scanner in order to address range uncertainty behavior based on indoor experiments under fixed environmental conditions. The analysis includes procedures for estimating the precision and accuracy of the observational errors estimated from the Stonex X300 observations and conducted at intervals of 5 m within a range of 5 to 30 m. The laser 3D point cloud data of the individual scans is analyzed following a roughness analysis prior to the implementation of a Levenberg–Marquardt iterative closest points (LM-ICP) registration. This leads to identifying the level of roughness that was encountered due to the range-finder’s limitations in close
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThe present study deals with the optimum design of self supporting steel communication towers. A special technique is used to represent the tower as an equivalent hollow tapered beam with variable cross section. Then this method is employed to find the best layout of the tower among prespecified configurations. The formulation of the problem is applied to four types of tower layout
with K and X brace, with equal and unequal panels. The objective function is the total weight of the tower. The variables are the base and the top dimensions, the number of panels for the tower and member's cross section areas. The formulations of design constraints are based on the requirements of EIA and ANSI codes for allowable stresses in the members
The present study focused mainly on the vibration analysis of composite laminated plates subjected to
thermal and mechanical loads or without any load (free vibration). Natural frequency and dynamic
response are analyzed by analytical, numerical and experimental analysis (by using impact hammer) for
different cases. The experimental investigation is to manufacture the laminates and to find mechanical
and thermal properties of glass-polyester such as longitudinal, transverse young modulus, shear modulus,
longitudinal and transverse thermal expansion and thermal conductivity. The vibration test carried to
find the three natural frequencies of plate. The design parameters of the laminates such as aspect ratio,
thickness
The study focused on the identification of the natural relation between the organizational components, and the most important is the organizational structure, which not hid its effect on each function and operation of the organizational structure through commanding the individual craters and its forms according to the requirement of these function, also it has relation with an organic synthesis that between the dimensions of the organic synthesis and the practice side in the commission of Integrity.
The problem of the research pensioned in some questions about hypothesis and theoretical parts, in which they go a mention about the hypothesis questions is to use all the knowledge's in this atmosphere and th
... Show MoreAs a result of the increase in wireless applications, this led to a spectrum problem, which was often a significant restriction. However, a wide bandwidth (more than two-thirds of the available) remains wasted due to inappropriate usage. As a consequence, the quality of the service of the system was impacted. This problem was resolved by using cognitive radio that provides opportunistic sharing or utilization of the spectrum. This paper analyzes the performance of the cognitive radio spectrum sensing algorithm for the energy detector, which implemented by using a MATLAB Mfile version (2018b). The signal to noise ratio SNR vs. Pd probability of detection for OFDM and SNR vs. BER with CP cyclic prefix with energy dete
... Show MoreWriting plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and
Background: Animal bites in humans are an important public health problem. Most of these bites are dog bites. Dog bites in humans are a complex problem embracing public health and animal welfare, both in developed and developing nations. .
Al-kindy Col Med J Vol.8 No.2 2012 P: 149
Objectives: in order to estimate the magnitude of the problem and to understand the epidemiological characteristics of dog bite victims registered in Baghdad city regarding their age, sex, number of registered dog bite victims per month and year along the studied period ( 2006-2010) and also to sniff out any seasonal variation in dog bite attacks .
Methods: A across-sectional study was carried out during January (2011), in the Anti-Rabies clinic of (Pa
RM Abbas, AA Abdulhameed, AI Salahaldin, International Conference on Geotechnical Engineering, 2010