The quality and cost of constructed buildings are heavily influenced by the performance of design/auditing consultants. Thus, selecting the right design consultant and design auditing consultants is of utmost importance and not an easy task for any construction client. so, the client should specify the efficiency criteria and assess the performance levels of the design and design auditing consultant firm. The study aims to identify the selection criteria of the design consultant in construction projects and also identify the selection criteria of the design auditing consultant for the construction projects by using the Delphi survey with applying the principal components analysis (PCA
Suggestion Plan for the Reclassification of U.N Publications in Central Library
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreThe aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).
Obiovisly that the holy thresholds are directly related to Islam and Muslims and related to the general culture of the Islamic peoples. In terms of architecture, it is considered a distinctive architectural scene that reviews the history of this origin and its architectural styles. Recently, with the increase in the number of pilgrims and visitors to the holy shrines, there is a need to develop and expand the buildings and provide them with services and introduce modern technology. The building of the holy thresholds consists of a number of functional design indicators: The general problem of research is that there is no clear theoretical framework for the design indicators for the development of the holy shrines according to the functio
... Show MoreCoaxial (wire-cylinder) electrodes arrangements are widely used for electrostatic deposition of dust particles in flue gases, when a high voltage is applied to electrodes immersed in air and provide a strongly non-uniform electric field. The efficiency of electrostatic filters mainly depends on the value of the applied voltage and the distribution of the electric field. In this work, a two-dimensional computer simulation was constructed to study the effect of different applied voltages (20, 22, 25, 26, 28, 30 kV) on the inner electrode and their effect on the efficiency of the electrostatic precipitator. Finite Element Method (FEM) and COMSOL Multiphysics software were used to simulate the cross section of a wire cylinder. The results sh
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show More