Building Information Modeling (BIM) is extensively used in the construction industry due to its benefits throughout the Project Life Cycle (PLC). BIM can simulate buildings throughout PLC, detect and resolve problems, and improve building visualization that contributes to the representation of actual project details in the construction stage. BIM contributes to project management promotion by detecting problems that lead to conflicts, cost overruns, and time delays. This work aims to implement an effective BIM for the Iraqi construction projects’ life cycle. The methodology used is a literature review to collect the most important factors contributing to the success of BIM implementation, interview the team of the Central Bank of Iraq (CBI) building, and strive to improve the BEP of the CBI building. However, previous studies indicate collaborative work and communications enhance effective BIM implementation, which can improve BIM use by applying a BEP and an AEC (UK) BIM protocol that leads to positive BIM impact. BEP comprises important information and goals related to the intended project, including the BIM collaborative process (process map), information exchange requirements, BIM data management, BIM model management, and quality control, which are considered essential for enhancing BIM collaboration during PLC. This paper concludes that implementing BIM effectively requires overcoming obstacles faced by Iraqi construction projects. Effective BIM implementation requires improving collaboration and communication throughout the construction process, which could be achieved by depending on the BIM Execution Planning Guide(BEP Guide) and the AEC (UK) BIM Protocol 2012 V2.0
The current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio
... Show MoreFour metal compounds mixed ligand of azo dye ligand (L) and metformin.(Met) were produced at aquatic ethanol for (1:1:1) (M:L:Met). The prepared compounds were identified by utilizing atomic absorption flame, FT.IR and UV–Vis spectrum manners as well as conductivity mensuration. These compounds was assayed of the gained datum the octahedral geometry was proposed into whole prepared complexes.Also in this research was studied represented examining the antibacterial and antifungal impact of the azo dye ligand (L), metformin.(Met) and (Co,Ni, Cu and Cd complexes) on four types of pathogenic, clinically isolated bacteria that are resistant to antibiotic, like Staphylococcus aureus, Staphylococcus epidermidis, Escherichia coli, Klebsiella pneu
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
This study explored the development and qualities of the response of electrochemical properties of enrofloxacin-selective electrodes using precipitation based on producing phosphotungstic, after utilizing a matrix of polyvinyl chloride (PVC) and dibutyl phthalate or dibutyl phosphate as a plasticizer. The resulting membrane sensors were an enrofloxacin-phosphotungstic electrode (sensors 1) and an ENR-DOP-PTA electrode (sensors 2). Linear responses of (ENR-DBPH-PTA) and (ENR-DOP-PTA) within the concentration ranges of 2.1×10-6-10-1 and 3.0×10-6-10-2 mol. L-1, respectively, for both sensors were observed. Slopes of 51.61±0.24 and 39.40± 0.16 mV/decade and pH ranges equal to 2.5-8.5
... Show MoreEye Detection is used in many applications like pattern recognition, biometric, surveillance system and many other systems. In this paper, a new method is presented to detect and extract the overall shape of one eye from image depending on two principles Helmholtz & Gestalt. According to the principle of perception by Helmholz, any observed geometric shape is perceptually "meaningful" if its repetition number is very small in image with random distribution. To achieve this goal, Gestalt Principle states that humans see things either through grouping its similar elements or recognize patterns. In general, according to Gestalt Principle, humans see things through genera
... Show MoreIntroduction: Melanin is a high-molecular weight pigment produced through the oxidative polymerization of phenolic or indolic compounds and plays a perfect role in UV-light shielding, as well as in photoprotection. Among biopolymers, melanin is unique in many aspects. This study is designed to screen Production, extraction and characterizes of an extracellular melanin pigment from clinically isolated P. aeruginosa. Objective: The aim of the current study is isolation and diagnosis of P.aeruginosa using vitek-2 compact system and screening the ability to produce melanin and characterization of extracted melanin by UV-vis, FTIR, XRD and SEM. Materials and methods: the samples swab inoculated on cetrimide agar as selective media and incubated
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More