Applying the constructability concept in the construction industry has proven many benefits in different projects; however, this concept still lacks usage in Iraq. Therefore, it is important to encourage usage of the constructability concept in the construction industry in Iraq. The main purpose of this study is to investigate the factors that affect constructability in Iraq and then classify them according to their importance. A total of 37 factors were collected from an intensive literature review, and they were classified under the sub and main categories. A survey was undertaken in two sessions with open questionnaire and close questionnaire. The results were analysed and the mean, standard deviation and Cronbach’s Alpha were obtained. Also, the developed weight was calculated for each alternative factor. The goal of this paper is to define the main factors that have an effect on Iraqi’s constructability project in order to avoid issues in future Iraqi projects. The outcome showed that 34 factors had a major effect on increasing the constructability percentage in construction projects in Iraq. The top-ranking factors were structural frame types, high-strength concrete usage, adjacent infrastructures and adjacent site.
Arthropod-borne infections, known as vector-borne diseases, are a significant threat to both humans and animals. These diseases are transmitted to humans and animals through the bites of infected arthropods. In the last half century, there have been a number of unexpected viral outbreaks in Middle Eastern countries. Recently, Iraq has witnessed an outbreak of the Crimean-Congo Hemorrhagic Fever virus with high morbidity and mortality rates in humans. However, very little is known about the prevalence and distribution of CCHFV in Iraq, and therefore, it is impossible to quantify the risk of infection. CCHFV is transmitted to humans through the bite of infected ticks. However, transmission can also occur through contact with the blood or ti
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe theory of Pilgrims in the Magra is based on Dekru's view that the mgha is considered a pilgrim, and that the pilgrims are pilgrims
Tujia purely exposes the abstract temptation structure, and that the discharge of the Mfezouz Mfarouz is through factors
This theory tends to highlight the role of pilgrim function as a language
There is no preservation unless directed towards a particular outcome. Gemma can include morphine blindness
Or formulas that allow for the presentation of a pilgrimage to a writer in addition to the content of the news, and the guidance of the recipient
In one direction or another.
The orbital masses are one of these morphines and functional components that achieve function
The Togolese
The scholars of Arabic - may God reward them with the reward of the doers of good - laid down the rules of this language, the cycle of which never ceases to dazzle minds, so they adopted principles according to which they judged the denomination of this word, and the accusative of that, and determined in its light the worker and the done, until they reached us the rules and foundations of our dear language, and it is obvious that they differ. The origins of grammarians from one school of thought to another, or from one world to another, especially with regard to the subsidiary rules, and this difference was clearly reflected in what we have received from the rules, as we find a difference in the rulings that they restricted to the one fa
... Show MoreThis study was conducted to evaluate the bottled water quality for the six-producing companies in Baghdad city, where selected six brands which are the most marketed in the Iraqi market, especially in Baghdad, where taking the proper amount of bottled water in September 2015 and included the studied characteristics (EC , pH ,TDS, Turbidity, Ca+2, Mg+2, Cl-, No3-, So4-2, HCO3-, Na+ and K+) in addition to the total population of bacteria aerobic and coliform, and compare the results with the standard specifications of the Iraqi and the World Health Organization (WHO), as well as to compare the results of sampling specifications mentioned on the packaging by the producing companies. The results showed the presence of high significant differ
... Show MoreThe research addressed an analytical field investigation of the locality of meander, the factors responsible of the locality of the meander at certain points of the stream other than others, and the role sequence of these factors in the formation process.
The research revealed that the location of forming the meander was associated closely with the scale structural composition of the bank materials from which the first stage of forming the curved stream, for the inhomogeneous or non-identical opposite banks in their scale structural composition saw an activity of differential corrosion, while the homogeneous and identical opposite banks in their scale structural composition saw an identical corrosion activity in its intensity at both
Abstract That the child is aged 7 years, surrounded by information, knowledge and skillsvaried, which constitute the raw material of experience teaching and is in the rule of inputlearning, if received by the student of these data are positive, these data require research and audit, the style becomes more positive, effective, and then becomes the explorer, butnot done exploration efficiency without the visual, auditory and sensory owned by thechildren. So study aimed to identify the values of the optical track and explore mathematical and find the relationship between them. And use the descriptive approach in a manner the linkon the children of the first year of primary school age (6-7) years in my school Waziriya and Karkh, during the peri
... Show MoreAll major organs may be impacted by the connective disease systemic lupus erythematosus, a separate risk factor for coronary artery disease (CAD). Adhesion molecules like intercellular adhesion molecules (ICAM) and vascular cell adhesion molecules (VCAM) can detect endothelial damage and dysfunction, which appear to play a crucial role. This study investigated whether people with SLE had elevated subclinical and clinical atherosclerosis risk factors. Traditional CAD risk factors such as smoking, hypertension, and hyperlipidemia cannot entirely explain this elevation. It is thought that immunological dysfunction also increases CAD risk in SLE patients. The study aimed to assess early endothelial changes in SLE Iraqi female patients w
... Show MoreThe business environment is witnessing tremendous developments in the field of production and technology, which requires the development of production methods to go in line with these developments and the increasing competition, which has gone beyond the economic aspects to extend to the environmental aspects, as economic units tended to adopt a cleaner production strategy and through what they achieve by producing environmentally friendly products and achieving economic efficiency. Reducing costs, providing a safe and clean environment for workers, and reducing waste from production operations.
Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show More