Preferred Language
Articles
/
joe-2899
CONSTRUCTION DELAY ANALYSIS USING DAILY WINDOWS TECHNIQUE
...Show More Authors

Delays occur commonly in construction projects. Assessing the impact of delay is sometimes a contentious
issue. Several delay analysis methods are available but no one method can be universally used over another in
all situations. The selection of the proper analysis method depends upon a variety of factors including
information available, time of analysis, capabilities of the methodology, and time, funds and effort allocated to the analysis. This paper presents computerized schedule analysis programmed that use daily windows analysis method as it recognized one of the most credible methods, and it is one of the few techniques much more likely to be accepted by courts than any other method. A simple case study has been implemented to demonstrate the accuracy and usefulness of the proposed delay analysis model. The results of the study indicate that the outcomes of delay analyses are often not predictable that each method may yield different results. The study also revealed that depending on the time and resources available, and the accessibility of project control documentation, one method may be more practical or cost-effective.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Baghdad College Of Dentistry
Surface Characterization of PEKK Modified by stron-tium –hydroxyapatite coating as implant material Via the magnetron sputtering Deposition technique
...Show More Authors

Background: The best material for dental implants is polyetherketoneketone (PEKK). However, this substance is neither osteoinductive nor osteoconductive, preventing direct bone apposition. Modifying the PEKK with bioactive elements like strontium hydroxyapatite is one method to overcome this (Sr-HA). Due to the technique's capacity to provide better control over the coating's properties, RF magnetron sputtering has been found to be a particularly useful technique for deposition.

Materials and methods : With specific sputtering conditions, the RF magnetron technique was employed to provide a homogeneous and thin coating on Polyetherketoneketone substrates.. the coatings were characterized by Contact angle, adhesion test, X-ray dif

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (12)
Scopus Crossref
Publication Date
Wed Jun 26 2019
Journal Name
The Iraqi Geological Journal
A MODIFIED WATER INJECTION TECHNIQUE TO IMPROVE OIL RECOVERY: MISHRIF CARBONATE RESERVOIRS IN SOUTHERN IRAQ OIL FIELDS, CASE STUDY
...Show More Authors

A modified water injection technique has organized by this study to improve oil recovery of the Mishrif reservoirs using polymerized alkaline surfactant water (PAS-Water) injection. It is planned to modify the existing water injection technology, first to control and balance the hazardous troublemaker reservoir facies of fifty-micron pore sizes with over 500 millidarcies permeability, along with the non-troublemaker types of less than twenty micron pore sizes with 45 to 100 millidarcies permeability. Second to control Mishrif reservoirs rock-wettability. Special core analysis under reservoir conditions of 2250 psi and 90 °C has carried out on tens of standard core plugs with heterogeneous buildup, using the proposed renewal water f

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Preparation and characterization of mawsonite Cu6Fe2SnS8 [CFTS] thin films via the semi-computerized spray pyrolysis technique for photovoltaic applications
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Stress Concentration factor Analysis of Helical Gear Drives with Asymmetric Teeth Profiles
...Show More Authors

This study investigates the influence of asymmetric involute teeth profiles for helical gears on the bending stress. Theoretically, bending stress has been estimated in spur involute gears which have symmetric teeth profile by based on the Lewis, 1892 equation. Later, this equation is developed by, Abdullah, 2012. to determine the effect of an asymmetric tooth profile for the spur gear on the bending stress. And then these equations are applied with stress concentration factor once for symmetric and once other for asymmetric teeth profile. In this paper, the bending stresses for various types of helical gear with various types of asymmetric teeth profile are calculated numerically for defined the stress concentration fac

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Analysis of the Content of the Computer Textbook for the Second Intermediate Grade According to Scientific and Moral Values
...Show More Authors

The purpose of this research is to design a list of the scientific and moral values that should be found in the content of the computer textbook for the second intermediate grade, as well as to analyze the content of the above- mentioned book by answering the following question:

 What is the percentage of availability of scientific and moral values in the content of the computer textbook for Second Intermediate grade issued by the Iraqi Ministry of Education / the general directorate of the curriculum, for the academic year (2017-2018)? 

In order to achieve the research objectives, the descriptive method (content analysis method) was adopted. The research community has been iden

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Geological Journal
GEOHISTORY ANALYSIS AND BASIN DEVELOPMENT OF THE LATE BERRIASIAN-APTIAN SUCCESSION, SOUTHERN IRAQ
...Show More Authors

The studied succession is deposited during late Berriasian-Aptian interval, which is represented by the Zubair, Ratawi, Yamama formations. The present study includes stratigraphic development and basin analysis for 21 boreholes (Rachi-1, 2; Rifaei-1, Diwan- 1; Ratawi-1, 2; Halfaia-5; West Qurna 12, 15; Nahr Umr-7,8; Zubair-47,49; North Rumaila- 72, 131, 158; Suba-7; Majnoon-2, 3 and Luhais-2, 12) distributed within 13 oil fields in the southern Iraq. The back-stripping process determined the original direction of basin depocenter for the studied succession. The Yamama basin in the study area stretches from southeast to southwest with single depocenters, it was located in the southeast of the study area near wells Mj-2, Mj-3.NR-8 and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Sun Jun 01 2025
Journal Name
International Journal Of Environmental Sciences
Critical Discourse Analysis Of Ideological Interdiscursivity In Selected Artificial Intelligence English Extracts
...Show More Authors

The study employs Critical Discourse Analysis (CDA) to analyze how technological discourses are influenced by AI-generate d English texts. The research marries Fairclough’s three-dimensional discourse analysis, Van Dijk’s socio-cognitive approach, and Corpus-Assisted Discourse Studies (CADS) in the use of mixed-methods research, integrating primarily qualitative analysis with quantitative corpus-based data, to perform a thorough analysis of twenty AI-produced English texts. The findings identify the sophisticated linguistic mechanisms through which AI language employs modality, nominalization, passive voice, and interdiscursive blending to normalize and legitimize dominant contemporary ideologies. These mechanisms serve to legitimize te

... Show More
View Publication Preview PDF