Maintenance of hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysis, which represents " analyzing the internal factors represented by strengths and weaknesses points and the external factors represented by opportunities and threats," [41]. On the basis of that, an equation has been obtained to estimate the cost of annual maintenance. To achieve this aim, the following issues should be taken into consideration:
Studying the actual work program of the maintenance department in Al-Sader Hospital,
Identifying the procedures used in maintenance and ways they are implemented,
Studying the maintenance records and reports,
Holding interviews with the manager of maintenance and its staff to integrate the information and
Integrating the analysis of maintenance cost by using statistical analysis system (ASA 2012).
To assess the validity of the model for the annual maintenance cost, the predicted values of the . equation are plotted against the actual measured (observed) values. Based on the validation data set, the coefficient of determination (R) was found to be equal to (82.5%), therefore it can be concluded that the developed equation showed moderate agreement with the actual measurements. Finally, it can be concluded from the study that, the developed equation should be pplied in hospital to overcome the problems and weak points of the current system and to estimate the annual maintenance cost for hospitals based on the scientific method.
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone
... Show MoreThe present paper sheds light on the psychological structure of Simha Bin Zion’s A Broken Soul. After reviewing the biography of the storyteller, it is clear that the hero of the rebellious character in the story of (A Broken Soul) is the writer himself. The storyteller directly begins to depict his psychological sufferings in his childhood days. He tells a story full of sadness and refusal of the neglect he suffered in his childhood. It is obvious that the early five years of Samha bin Zion’s life is considered a period of conflict that participated in the formation of his individual identity. The story represents an outlet for a hidden secret world buried under the layers of his consciousness. It deals with
... Show Moreيهدف هذا العمل الى بيان طبيعة العلاقة بين الادارة بالتجوال والتجديد الاستراتيجي ، ومدى تأثير المتغير المستقل في المتغير التابع. تضمنت فقرات الاستبانة بوصفه الأداة الرئيسة لجمع البيانات ثلاث جوانب اساسية، تضمن الاول البيانات الشخصية للمستجيبين، فيما تضمن الجانب الثاني الفقرات الخاصة بمتغير الادارة بالتجوال من خلال خمسة ابعاد، فيما اشتمل الجانب الثالث على فقرات التجديد الاستراتيجي عبر تناول اربعة ابعاد. ي
... Show MoreThe main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show MoreIn this study, a 3 mm thickness 7075-T6 aluminium alloy sheet was used in the friction stir welding process. Using the design of experiment to reduce the number of experiments and to obtain the optimum friction stir welding parameters by utilizing Taguchi technique based on the ultimate tensile test results. Orthogonal array of L9 (33) was used based on three numbers of the parameters and three levels for each parameter, where shoulder-workpiece interference depth (0.20, 0.25, and 0.3) mm, pin geometry (cylindrical thread flat end, cylindrical thread with 3 flat round end, cylindrical thread round end), and thread pitch (0.8, 1, and 1.2) mm) this technique executed by Minitab 17 software. The results showed th
... Show More