Project management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreThe study dealt with measuring the impact of the availability of each of the content elements of the interaction, electronic services, and information on the evaluation of the users of the government website for its effectiveness in terms of the site’s functions and for measuring the site’s ability to present the organization’s tasks to customer groups.
Authority is concerned with measuring the confidence of customers in the content of the site, and in the organization as a whole. Validity is related to measuring the effectiveness of employing the site’s content to achieve the goal of its creation and in communicating with customers. Availability It is for measuring the ease of use of the site. The relevance, which means
... Show MoreCantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successful
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).
The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.
The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha
... Show MoreThe research objectives, to build a measure of the level of tactical performance of volleyball players applying for the Iraqi Premier League for the 2018-2019 season. The nature of the research problem, then the researchers determined the research sample in the deliberate manner of the players of the Iraqi clubs for the Premier League (B, A). The researchers adopted the entire community as a sample for the research, and the number (156) players distributed over (13) clubs and divided the sample into (12)players an exploratory experiment player representing (the police club) and (100) player representing the construction sample and after a maximum period of two months has passed since applying the scale to the construction sample the researc
... Show MoreThe analysis and efficiency of phenol extraction from the industrial water using different solvents, were investigated. To our knowledge, the experimental information available in the literature for liquid-liquid equilibria of ternary mixtures containing the pair phenol-water is limited. Therefore the purpose of the present investigation is to generate the data for the water-phenol with different solvents to aid the correlation of liquid-liquid equilibria, including phase diagrams, distribution coefficients of phenol, tie-lines data and selectivity of the solvents for the aqueous phenol system.
The ternary equilibrium diagrams and tie-lines
... Show More