Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time with the available funds. The model has been tested in multi scenarios, and the results are analyzed. The results show that negative cash flow is minimized from −693,784 to −634,514 in enterprise I and from −2,646,408 to −2,529,324 in enterprise II in the first scenario and also results show that negative cash flow is minimized to −612,768 with a profit of +200,116 in enterprise I and to −2,597,290 with a profit of +1,537,632 in enterprise II in the second scenario.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIt is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi
... Show MoreBackground and purpose: Animal model helps researchers to evaluate new treatment plan for human and understand pathological mechanism involved in a development of disease. The use of rats as an animal model for Alzheimer's research has become a favorite among researchers. Rats are capable in mimicking Alzheimer disease due to their intelligence and quick adaptation to nature. At present there are several methods that can be used to induce Alzheimer's animals, but each method has advantages and disadvantages. We need to learn other methods that can provide many advantages and few disadvantages. The Amyloid-beta 42 (Aβ-42) and Reactive Oxygen Species (ROS) are thought to play an important role in the pathology of Alzheimer’s disease. Th
... Show More Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built
Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat
... Show MoreThe cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreWheat straw was modified with malonic acid in order to get low cost adsorbent have a good ability to remove copper and ferric ions from aqueous solutions, chemical modification temperature was 120°C and the time was 12 h. Parameters that affect the adsorption experiments were studied and found the optimum pH were 6 and 5 for copper and iron respectively and the time interval was 120 min and the adsorbent mass was 0.1 g. The values for adsorption isotherms parameters were determined according to Langmuir [qmax were 54.64 and 61.7 mg/g while b values were 0.234 and 0.22 mg/l] , Freundlich [Kf were 16.07 and 18.89 mg/g and n were 2.77 and 3.16], Temkin [B were 0.063 and 0.074 j/mol and At were 0.143 and 1.658 l/g] and for Dubinin-Radushkev
... Show MoreNonlinear time series analysis is one of the most complex problems ; especially the nonlinear autoregressive with exogenous variable (NARX) .Then ; the problem of model identification and the correct orders determination considered the most important problem in the analysis of time series . In this paper , we proposed splines estimation method for model identification , then we used three criterions for the correct orders determination. Where ; proposed method used to estimate the additive splines for model identification , And the rank determination depends on the additive property to avoid the problem of curse dimensionally . The proposed method is one of the nonparametric methods , and the simulation results give a
... Show MoreThe transformation of a physical system to mathematical base is very important due to analysis of the systems behavior. In this paper an electric power system is considered, we design mathematical model for the determination of the increase in operational cost of transmission line from Haditha Dam substation to Qa'im substation . We derived relations which the approximate distance for VARS transmission must satisfy with considering minimum losses in the system. MATLAB computer programming is used to obtain the numerical results. The developed mathematical model and the numerical results could be useful to electric power systems engineers