Preferred Language
Articles
/
joe-1696
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovations in the Iraqi construction industry. Even though many scholars and practitioners agree on the potential application and benefits of BIM in construction/ Facilities Management FM, it is yet unknown why BIM is used and what criteria facilitate BIM achievement in O&M. As long as the actual usage and acceptance of BIM in the Operation and Maintenance phase is still a central issue in practice, therefor depending on the extensive well ground literature review a conceptual acceptance model is proposed in this paper by applying the technology acceptance theories such as Technology Acceptance Model (TAM) and Task Technology Fit (TTF) to explore how the extent of facilities management staff going to accept and adopt the new international technology (BIM).

                               

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 31 2024
Journal Name
International Review On Modelling And Simulations (iremos)
Prosthetic Hand: a Brief Survey of Design and Actuation Technologies
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Middle East and its Strategic Dimensions: a theoretical study
...Show More Authors

Characterized the Middle East has geographic, economic, and geostrategic peculiarities, but it suffers from many problems, such as disagreement over what it means as a concept, or what it represents of a geographic extension. The question is related to the ambiguity surrounding the concept of the Middle East? The purpose of its launch? As it relates to its geostrategic, economic, and geo-cultural importance? And manifestations of this importance? And to what extent he retained his value in the strategies of the major powers? Research hypotheses:

-The multiplicity of concepts for the Middle East region, with international political and Geostrategic interests.- The geostrategic value of the Middle East has made it a focal point for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun May 05 2024
Journal Name
Review Of Clinical Pharmacology And Pharmacokinetics - International Edition
Isolation and characterization of a tetrahydroprotoberberine alkaloid from Crassula ovata
...Show More Authors

The presence of alkaloids in Crassula ovata is a topic that is still unexplored, as there are no published studies on the matter. This study demonstrates the presence of an alkaloid compound (and its class) for the first time in Crassula ovata. The plant material was defatted with n-hexane, and a Soxhlet apparatus was used for the extraction process, while the acid-base method was used for the isolation of alkaloids from the chloroform fractions. The quaternary alkaloid was precipitated from the aqueous layer spontaneously, in high quantity. By using standard spectroscopic methods (including liquid chromatography - mass spectroscopy) we were able to clarify the structure of the precipi¬tated compound as a tetrahydroprotoberberine a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
A Stylistic Study of English Aphorisms of “Life and Death”
...Show More Authors

In this paper , some of lexical stylistic , syntactical stylistic  devices , and one phonetic stylistic device are going to be illustrated in the study of the aphorisms of “life and death” . These stylistic  devices are parallelism , hyperbole , alliteration , meiosis , irony , oxymoron , cliché , litotes , metalepsis , and loose sentences.  This paper aims at identifying the functions and the  frequencies of these devices. These stylistic devices make one speech and writing more interesting and help to get the attention of readers/ listeners

View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Aip Conference Proceedings
A review on hybrid methods using playfair and RSA techniques
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Epitoanyag - Journal Of Silicate Based And Composite Materials
Flame retardants, their beginning, types, and environmental impact: a review
...Show More Authors

The current study introduces a novel method for calculating the stability time by a new approach based on the conversion of degradation from the conductivity curve results obtained by the conventional method. The stability time calculated by the novel method is shorter than the time measured by the conventional method. The stability time in the novel method can be calculated by the endpoint of the tangency of the conversion curve with the tangent line. This point of tangency represents the stability time, as will be explained in detail. Still, it gives a clear and accurate envisage of the dehydrochlorination behavior and can be generalized to all types of polyvinyl chloride compared to the stability time measured by conventional ones based

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Tue Feb 21 2023
Journal Name
Journal Of Risk And Financial Management
A Multidimensional View of Intellectual Capital and Dynamic Innovative Performance
...Show More Authors

A review of the literature on intellectual capital development was conducted using systemic criteria for the inclusion of relevant studies. The concepts behind the ideas explored in the present study were discussed in respect to the subject matter. Examining the past state of the art in the intellectual capital sector for achieving high levels of innovation performance provided a multidimensional picture of intellectual capital, innovation performance, and dynamic capabilities. The present review was designed to illustrate the correlation between intellectual capital and innovation performance, as well as the role of dynamic capabilities in moderating the relationship between these constructs. Accordingly, we presented an extensive

... Show More
View Publication
Scopus (40)
Crossref (27)
Scopus Crossref