This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and to improve the current performance of project management and execution. The suggested system principles and fundamentals, benefits, features, classification and types, and the different solutions are described to ease and improve the process of development, adoption, and implementation of the system. The results show that the proposed system can improve the performance of the current state of project management through improving the processes of information and communication management.
This study aims to clarify areas of using information technology in accounting and its impact on the profession of auditors by reviewing the concept, types, areas and the importance of information technology and its implications on the audit profession as well as to clarify the extent of contribution of information technology in developing of procedures of the audit profession and what its requirement, also this study aims to enhance the theoretical side by identifying the views of a sample of auditors in Arab countries selected (Iraq, Syria, Jordan), for the extent of using of information technology in their work and level of their perception for the importance of that
AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai
... Show MoreAbstractOBJECTIVES: To evaluate the long-term remission efficacy and safety of isotretinoin in the treatment of Behcet's disease (BD). PATIENTS and METHODS: This single-blind, controlled therapeutic study was conducted in the Department of Dermatology and Venereology at Baghdad Teaching Hospital from February 2011 to January 2012. Thirty patients with BD were included in this work. Each patient received isotretinoin 20 mg orally once daily for 3 months. They were assessed at week 2 and then monthly depending on the Clinical Manifestation Index (CMI) and to record any side effects. At week 12, isotretinoin was stopped and patients were given placebo therapy in a form of glucose capsules for another 3 months. RESULTS: Thirty patients were tre
... Show MoreWireless Body Area Sensor Network (WBASN) is gaining significant attention due to its applications in smart health offering cost-effective, efficient, ubiquitous, and unobtrusive telemedicine. WBASNs face challenges including interference, Quality of Service, transmit power, and resource constraints. Recognizing these challenges, this paper presents an energy and Quality of Service-aware routing algorithm. The proposed algorithm is based on each node's Collaboratively Evaluated Value (CEV) to select the most suitable cluster head (CH). The Collaborative Value (CV) is derived from three factors, the node's residual energy, the distance vector between nodes and personal device, and the sensor's density in each CH. The CEV algorithm operates i
... Show MoreLED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e
... Show MoreAbstract
This study investigates the mechanical compression properties of tin-lead and lead-free alloy spherical balls, using more than 500 samples to identify statistical variability in the properties in each alloy. Isothermal aging was done to study and compare the aging effect on the microstructure and properties.
The results showed significant elastic and plastic anisotropy of tin phase in lead-free tin based solder and that was compared with simulation using a Crystal Plasticity Finite Element (CPEF) method that has the anisotropy of Sn installed. The results and experiments were in good agreement, indicating the range of values expected with anisotropic properties.
Keywords<
... Show More