Preferred Language
Articles
/
joe-67
Determine an Equation to Calculate the Annual Maintenance Cost for Public Hospitals (Al Sader City Hospital as a Case Study)
...Show More Authors

Maintenance of  hospital buildings and its management are regarded as an important subject which needs attention because hospital buildings are service institutions which are very important to a society, requiring the search for the best procedure to develop maintenance in hospitals. The research is aimed to determine an equation to estimate the annual maintenance cost for public hospital. To achieve this aim, Al-Sader City Hospital maintenance system in Al-Najaf province has been studied with its main elements through survey of data, records and reports relating to maintenance during the years of the study 2008-2014 and to identify the strengths, weaknesses, opportunities and threat points in the current system through Swat analysis, which represents " analyzing the internal factors represented by strengths and weaknesses points and the external factors represented by opportunities and threats," [41]. On the basis of that, an equation has been obtained to estimate the cost of annual maintenance. To achieve this aim, the following issues should be taken into consideration:
 
 Studying the actual work program of the maintenance department in  Al-Sader Hospital,
 Identifying the procedures used in maintenance and ways they are implemented,
 Studying the maintenance records and reports,
 Holding interviews with the manager of maintenance and its staff to integrate the information and
 Integrating the analysis of maintenance cost by using statistical analysis system (ASA 2012).

To assess the validity of the model for the annual maintenance cost, the predicted values of the . equation are plotted against the actual measured (observed) values. Based on the validation data set, the coefficient of determination (R) was found to be equal to (82.5%), therefore it can be concluded that the developed equation showed moderate agreement with the actual measurements. Finally, it can be concluded from the study that, the developed equation should be  pplied in hospital to overcome the problems and weak points of the current system and to estimate the annual maintenance cost for hospitals based on the scientific method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
2017 12th International Conference For Internet Technology And Secured Transactions (icitst)
A novel multimedia-forensic analysis tool (M-FAT)
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jun 18 2004
Journal Name
Iraqi Journal Of Laser
Quantum Cryptography and a Quantum Key Distribution Protocol
...Show More Authors

In this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.

View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Language Academy
A LINGUISTIC INVESTIGATION OF CONTEXTUALIZATION IN RELIGIOUS DISCOURSE
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Therapeutic Delivery
Particles-based Medicated Wound Dressings: A Comprehensive Review
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Iraqi Journal Of Physics
Preparation of nano-microfibers with a different polymers
...Show More Authors

In this research, nanofibers have been prepared by using an electrospinning method. Three types of polymer (PVA, VC, PMMA) have been used with different concentration. The applied voltage and the gap length were changed. It was observed that VC is the best polymer than the other types of polymers.

View Publication Preview PDF