Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time with the available funds. The model has been tested in multi scenarios, and the results are analyzed. The results show that negative cash flow is minimized from −693,784 to −634,514 in enterprise I and from −2,646,408 to −2,529,324 in enterprise II in the first scenario and also results show that negative cash flow is minimized to −612,768 with a profit of +200,116 in enterprise I and to −2,597,290 with a profit of +1,537,632 in enterprise II in the second scenario.
The main purpose of this work is to find the complete arcs in the projective 3-space over Galois field GF(2), which is denoted by PG(3,2), by two methods and then we compare between the two methods
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreVariable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreSkin cancer is the most serious health problems in the globe because of its high occurrence compared to other types of cancer. Melanoma and non-melanoma are the two most common kinds of skin cancer. One of the most difficult problems in medical image processing is the automatic detection of skin cancer. Skin melanoma is classified as either benign or malignant based on the results of this test. Impediment due to artifacts in dermoscopic images impacts the analytic activity and decreases the precision level. In this research work, an automatic technique including segmentation and classification is proposed. Initially, pre-processing technique called DullRazor tool is used for hair removal process and semi-supervised mean-shift
... Show MoreChlamydia trachomatis is the most common of negative gram bacteria that cause sexually transmitted diseases. It affects the reproductive system in women, not the symptoms of the disease, but the most serious is the long-term effects of the reproductive system.. out of 100 women were attending different hospitals in Baghdad included the Gynaecology Departments of Women Health Center at Al-Elwyia Obstetrics Hospital . Ibn Al balady Maternity and Children's Hospital , Kamal al-Samarrai hospital Fertility Center infertility treatment and In Vitro Fertilization ( IVF ) (20 control and 80 women with infertility) DNA was extracted from the Endocervical Swabs of all infertili women, to investigate the bacteria by using Real time -PCR technique a
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is considered as the key technology to meet the huge demands of data rates in the future wireless communications networks. However, for massive-MIMO systems to realize their maximum potential gain, sufficiently accurate downlink (DL) channel state information (CSI) with low overhead to meet the short coherence time (CT) is required. Therefore, this article aims to overcome the technical challenge of DL CSI estimation in a frequency-division-duplex (FDD) massive-MIMO with short CT considering five different physical correlation models. To this end, the statistical structure of the massive-MIMO channel, which is captured by the physical correlation is exploited to find sufficiently
... Show MoreA simplified theoretical comparison of the hydrogen chloride (HCl) and hydrogen fluoride (HF) chemical lasers is presented by using computer program. The program is able to predict quantitative variations of the laser characteristics as a function of rotational and vibrational quantum number. Lasing is assumed to occur in a Fabry-Perot cavity on vibration-rotation transitions between two vibrational levels of hypothetical diatomic molecule. This study include a comprehensive parametric analysis that indicates that the large rotational constant of HF laser in comparison with HCl laser makes it relatively easy to satisfy the partial inversion criterion. The results of this computer program proved their credibility when compared with th
... Show MoreBased on the systematic scientific investigation of artistic achievement, researchers (critics) adhere to mechanisms based on epistemology, through which it is envisaged to reveal the meaning of the achievement as the product of three actors: the effectiveness of an artistic sense, the effectiveness of an idea, and the arousal of taste according to systematic criticism procedures that investigate the new artistic achievement. Or, in a specific way, the possibility of meaning in all the accomplished from the aesthetics of artistic presentation and the character of the self-accomplished by the "artist" and the critic invokes his critical tools with certain cognitive foundations. In defining its nature from the rest of the other cultural ac
... Show More