The construction industry plays a crucial role in the countries' economy, especially in the developed country. This point encourages the concerned institution to use new techniques and integrate many techniques and methods to maximize the benefits. The main objective of this research is to evaluate the use of risk management, value management, and building information modeling in the Iraqi construction industry. The evaluation process aims at two objectives. The direct objective was to evaluate the knowledge in risk management (RM), value management (VM), and building information modeling (BIM). The indirect objective was to support the participants with information related to the main items mentioned. The questionnaire
... Show MoreThe current research contains four chapters. The first topic included the methodological framework that included the problem of research and the need for it, and then the importance of the research, and then the aim of the research, its limits and the definition of terms linguistically, conventionally and procedurally. The second chapter (the theoretical framework) contained two topics, the topic The first is titled: The Outward Vision in Child Theater Performances, while the second topic was titled: Presentation Technology in Child Theater, Chapter Four (Research Procedures), which organized the research community and analyzed its sample, and the fourth chapter contained research results, conclusions and recommendations. The prop
... Show MoreAbstract: This study aims to identify mainly the experience of development of the state of Zimbabwe. The purpose of this study is to explain African studies in our Arab countries . The approach followed in this study is analytical description using also the comparative method as needed. This research division an introduction ,fourth topics and conclusions .The first dealt with the geographical location of the state of the Zimbabwe and explain of the main cities and a general introduction to the Republic of the state of Zimbabwe . The second section reviewed the historical development since the advent of colonial British colonialism and the declaration of Rhodesia Nyasaland in 1953 . As well as to clarify the position of stats and interna
... Show MoreThis study focuses for improving the increase the solubility of fiber cellulose in sodium hydroxide solution in concentrations ranging from (4- 12%), from one point of view and from other point of view in (sodium hydroxide and urea) solution concentration (6% NaOH + 4% urea), under low temperature (- 15, - 20 Co) , depending on the principle of reducing the degree of polymerization for fiber cellulose, which is represented in our tests cotton linter who its represent (Whatman filter paper, Grade 1), some samples subjected to chemical pretreatment as simulation the method of decomposition of cellulosic materials by white or brown fungi that grow on trees, this method involves the use of
... Show MoreThis research has been devoted to the objective and important issue which is the legal protection of the printing form of the newspaper in the Iraqi press.
As this issue constitutes the integrated unit of the printing format in addition to achieving legal protection for the illustrative image used in the press. Such matter, on both level the integrated unit of the printing format and the legal protection, is out of reach of study due to the comprehension of the subject is concerned.
Although there is a justification for dealing with both of them together as the explanatory image is one of the foundations on which the printing format of the newspaper is built. This case generates, at least, the same legal subject that appe
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Reverse shoulder arthroplasty is an increasingly common surgical intervention. However there are concerns and known limitations in relation to such joint replacement, while novel designs of reverse shoulder prostheses continue to appear on the market. Many claim to offer improvements over older designs but such assertions are difficult to validate when there is no consensus as to how such implants should be tested in vitro or even if such testing is necessary. In order to permit appropriate in vitro testing of reverse shoulder prostheses a unique, multi-station test rig was designed which was capable of applying motion in three axes to test prostheses. The shoulder simulator can apply up to 110° of motion in the flexion–extension and abd
... Show MoreArtificial intelligence techniques are reaching us in several forms, some of which are useful but can be exploited in a way that harms us. One of these forms is called deepfakes. Deepfakes is used to completely modify video (or image) content to display something that was not in it originally. The danger of deepfake technology impact on society through the loss of confidence in everything is published. Therefore, in this paper, we focus on deepfakedetection technology from the view of two concepts which are deep learning and forensic tools. The purpose of this survey is to give the reader a deeper overview of i) the environment of deepfake creation and detection, ii) how deep learning and forensic tools contributed to the detection
... Show MoreThe deficit budget, one of the results of increased public spending for their revenues due to the economic pressures imposed by the interest of the economies of those countries from the need to increase government spending in order to revitalize the national economy and accelerate economic growth rates and provide employment to the growing levels of unemployment in those countries opportunities and what is required to address the current debt crisis (borrowing), which has become a big burden on the governments and the need to move towards the application of austerity spending and tax increases, which inevitably forced those countries will be reflected reduced spending on basic aspects of life and their peoples, particularly earners
... Show More