The information required for construction quantities surveying is not only generated by various participants in different construction phases but also stored in different forms including graphics, text, tables, or various combinations of the three. To report a bill of quantities (BOQ), the project manager has to continuously excerpt information from various resources and record it on papers. Without adequate staff and time, this repetitive and tedious process is difficult for the project manager to handle properly and thus reduces the effectiveness and the accuracy of the quantities surveying process which creates problems during the design, tender, and construction supervision of construction projects for designers and contractors practicing because receipts are based upon actual quantities, such variations have an obvious impact on the contractor’s cash flow, once the actual quantities frequently vary from the estimated quantities listed in the BOQ. Hence, automation quantity surveying system has been developed by using GIS to extract the
data required for the quantity of different components of any construction project from AutoCAD drawings (spatial data), to report a BOQ after querying, manipulation, and analyzing these data. The system has been implemented on the construction project of Al khawarizmy College at Baghdad University in Baghdad. The main results of using this system are automatic generation a bill of quantity (BOQ) directly from design drawing, with overcome to design changing, accurate, fast, and effective method for estimating the quantities, fewer errors in cost estimating, and better documentation for continuously reusing information in all construction phases. The accuracy of GIS quantities had been proved by comparing these quantities with the quantities of site surveying. Then determining the accuracy percentage (A%) of GIS quantities which equals (98.85%), and the regression line that equals 0.999. These values mean; there are big correlation between the estimated quantities by GIS and the quantities of site surveying.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreIn this paper, a novel flow control strategy which is the inlet throttled pump was used to design an angular velocity control system for rotary actuator. Inlet throttled systems have good performance in addition to their high efficiency compared to traditional valve-controlled systems. The flow in the proposed system is adjusted by a valve that is positioned at the pump inlet with the purpose of reducing the energy loses across the valve. This regulated flow is used then to control the actuator angular velocity. The system was modeled and the open loop stability and performance were studied. In order to improve the system performance, proportional-integral-derivative (PID) and H-infinity controllers have been designed. The multiplicative un
... Show MoreBackground and Objectives: Wound healing is a complex process with overlapping phases haemostasis, inflammation, proliferation and maturation/matrix remodeling. Each phase of wound healing requires different management strategies, and inappropriate treatment can delay wound healing. The aim of the present study was to evaluate the efficacy of topical application of calmodulin as a significant augmentation of the granulation tissue production process of wound healing and to express of genes CaMKK2, MaP2K6 and CXCR4 at site of wound defect, that have versatile effects on the body and they belong to Ca/camodulin related genes. Material and Methods: In this study thirty albino male rats, weighting (300-400) gram, aged (6-8) months, wil
... Show MoreBackground: The restoration of bone continuity and bone union are complex processes, and their success is determined by the effectiveness of osteosynthesis. The use of plants for healing purposes predates human history and forms the source of current modern medicine The aim of this study: It was histological evaluation of effect of topical application of flavonoid on healing of induced bone defect in rabbit tibia. Material and method: Twenty-four Adult New Zealand rabbits used in this study, they were divided into four groups for the healing periods (3days, 1,2, and 4weeks) Two holes were induced in rabbit tibia one on the left side and has been left to heal normally as control. While, the other hole made on the right side filled with flavo
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
This paper proposes a self organizing fuzzy controller as an enhancement level of the fuzzy controller. The adjustment mechanism provides explicit adaptation to tune and update the position of the output membership functions of the fuzzy controller. Simulation results show that this controller is capable of controlling a non-linear time varying system so that the performance of the system improves so as to reach the desired state in a less number of samples.
An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show More