The work is devoted to the study of the plastics features in modern construction use. The plastics classification in modern construction is generalized. This classification includes: the field of building products application, the features of the materials properties and products, a backup group that includes those products that are not included in the previous groups. The classification considered is the basis for choosing the basic materials properties that affect the quality and durability of products. To improve the plastics types in the construction, the Venn diagram is used. The main materials types for manufacturing a product of the "window profile" type are analyzed; the result of the studies is a comparative diagram.
Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implement
In this research for each positive integer integer and is accompanied by connecting that number with the number of Bashz Attabq result any two functions midwives to derive a positive integer so that there is a point
Background: A core set of checks have been incorporated into World Health Organization (WHO) WHO surgical safety checklist. Lack of access to basic surgical care remains a major concern in low-income settings.
Objective: We use a WHO surgical safety checklist items to improve team communication and cooperation to help in reduction of morbidity and mortality of surgical procedures.
Methods: This is a prospective study involving 300 patients after applying the 19 items of the surgical safety checklist with different types of operations had been operated in the surgical theater at Al-Kindy Teaching Hospital during the period 1st of September 2016
... Show MoreAbstract
The research problem focuses on studying the interest of the Medical City Department of the Ministry of Health in improving the creative thinking skills of the administrative leadership through parallel & comprehensive thinking according to the of six thinking hats strategy. The research sample consisted of (170) administrative leaders in the upper & middle organizational levels, The questionnaire was used as a main tool for data collection, In addition to the observation & Interview, The research sought to answer the following questions: What is the extent to which the administrative leadership (Tpp & middle) in the organization investigated the concept of the six thinkin
... Show MoreA detailed methodology is presented in this paper for the calculation of nucleate boiling safety margin (NBSM) in nuclear research reactors using a temperature function with three different thermal-hydraulic hot-spot analyses: nominal, cumulative and statistical for normal operating condition and coolant flow variation. A computer simulation program is developed for applying the methodology to the IRT-5000 reactor based on experimental core data. According to cumulative analysis as the overconservative approach, the NBSM at normal operating condition of thermal power 5 MW and coolant velocity 1.672 m/s was 2.3% with reactor power limit 5.13 MW. However, during power or coolant flow trip condition, transient nucleate boiling would occur for
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More