Preferred Language
Articles
/
joe-2899
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implemented to demonstrate the accuracy and usefulness of the proposed delay analysis model. The results of the study indicate that the outcomes of delay analyses are often not predictable that each method may yield different results. The study also revealed that depending on the time and resources available, and the accessibility of project control documentation, one method may be more practical or cost-effective.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Drought assessment in Iraq using analysis of Standardized precipitation index (SPI)
...Show More Authors

The Present study investigated the drought in Iraq, by using the rainfall data which obtained from 39 meteorological stations for the past 30 years (1980-2010). The drought coefficient calculated on basis of the standard precipitation index (SPI) and then characteristics of drought magnitude, duration and intensity were analyzed. The correlation and regression between magnitude and duration of drought were obtained according the (SPI) index. The result shows that drought magnitude values were greater in the northeast region of Iraq. 

View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Engineering
Analysis of Prosthetic Running Blade of Limb Using Different Composite Materials
...Show More Authors

Prostheses are used as an alternative to organs lost from the body. Flex-Foot Cheetah is considered one of the lower limb prostheses used in high-intensity activities such as running. This research focused on testing two samples of Flex-Foot Cheetah manufactured of two various materials (carbon, glass) with polyester and compare between them to find the foot with the best performance in running on the level of professional athlete. In the numerical analysis, the maximum principal stress, maximum principal elastic strain, strain energy; finally, the blade total deformation were calculated for both feet. In experimental work, the load-deflection test was done for foot to calculate the bending the results were very close to

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Dar Amjad For Publishing And Distribution, The Hashemite Kingdom Of Jordan
Statistical Analysis of Non-parametric Tests Using IBM SPSS Statistics Version24
...Show More Authors

أن الطرق اللامعلمية هي نوع من الطرق الاحصائية الاستدلالية التي يمكن استخدامها للتوصل إلى أستنتاجات لذا كان حرص المؤلف على أصدار هذا الكتاب والذي يعمل على توضيح ( لماذا ؟ ومتى ؟ وكيف ؟ ) تستخدم كل طريقة إحصائية . وبإمكان القاريء سواء أكان أستاذا ً جامعيا ً أو باحثا ً أو طالبا ً في الدراسات العليا ( الماجستير والدكتوراه ) أو طالبا ً في الدراسات الأولية أن يتتبع جميع الخطوات لحساب كل قانون إحصائي وبدءا ً من عملية إدخ

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Explainable Artificial Intelligence In The Digital Sustainability Administration
Artificial Intelligence and Trends Using in Sustainability Audit: A Bibliometric Analysis
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Sep 16 2022
Journal Name
Sustainability
Intellectual Capital History and Trends: A Bibliometric Analysis Using Scopus Database
...Show More Authors

This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst

... Show More
View Publication Preview PDF
Scopus (75)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Defects Analysis of Tee-Section Welding Using Friction Stir Welding Process of Aluminum
...Show More Authors

Friction stir welding (FSW) of Tee-joints is obtained by inserting a specially designed rotating pin into the clamped blanks, through top plate (skin) to bottom plate (stringer), and then moving it along the joint, limiting the contact between the tool shoulder and the skin. The present work aims to investigate the defects occur for Tee-joint of an Aluminum alloy (Al 5456) with dimensions (180mm x 70mm) for the skin plate, (180mm x 30mm) for stringer plate and thickness of (4mm).
The effects of welding parameters such as rotational speed, linear speed, plunging depth, tool tilting, and die radii of welding fixture on the welding quality of Aluminum Alloy will be studied. Weld defects had been summarized and studied, and then the best

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Jun 21 2021
Journal Name
International Medical Journal
Immediate and Delay Antimicrobial Activity of Three Disinfection Solutions on Gutta-Percha Cones as Routine Chair-Side Procedure
...Show More Authors

Objective: The antimicrobial efficacy of three disinfection solutions: 5.25% sodium hypochlorite (NaOCl), 2% chlorhexidine (CHX) and Listerine mouthwash were investigated as routine chair-side gutta-percha (GP) disinfection reagents. Design: four groups of gutta percha points were contaminated with E. faecalis bacteria then disinfected by immersion in different solutions (5.25% sodium hypochlorite, 2% chlorhexidine gluconate, Listerine mouth wash and distilled water as control) after 1 and 7 days culturing periods. The antibacterial efficacy of these disinfection solutions was evaluated by using colonies per units (CPU) Methods: Forty GP cones (F3 Dentsply) were sterilized with ethylene oxide gas before immersed contamination within broth m

... Show More
View Publication Preview PDF