Measurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance parameters (cost, schedule, quality, leadership, and change management). At the same time, most project control systems are currently applied through software like Primavera P6 or MS Project. These look at a project’s cost and schedule status by following the earned value analysis for finding the performance. Based on decision makers’ preferences, the analytic hierarchy process (AHP) may be used to arrive at the optimum conclusion. AHP approaches are discussed, including AHP, grey-AHP, fuzzy-AHP, and SFAHP weights comparison. Calculation results showed that the spherical fuzzy approach differs significantly from the other approaches where it considers the decision maker’s hesitation when making linguistic multicriteria decisions and then, as a result, recommends applying periodically for performance measurement. This model can be viewed as a valuable way to help the decision-making stakeholders in the construction sector do the best job about critical issues at a suitable time.
I've led an end to the Palestinian presence in the Jordan to the occurrence of a major fault line in relations between Jordan and the Palestinian on the levels of all , and as a result sought King Hussein and the initiative of the U.S. to heal the rift that solution between Jordanians , Palestinians, and the regulation of relations between the two parties announced in March 1972 for the project and unitary featuring Jordan and Palestine in the Arab kingdom united with the two countries , but that the Palestine Liberation Organization and the Palestinian resistance factions rejected by asserting that it is has the right of self-determination of the Palestinian people and no one else , and rejected by the Arab states and ( Israel ) , and l
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreThe study of an urban street scene of the life cycle is one of the important things in urban scene studies and there are four vocabularys that are the basis for the life cycle of an urban scene and these vocabulary are (the street, transformation, land uses and urban scene).
the first vocabulary addressed in the research is the street where street classes were studied and its classifications in terms of morphology and function and study of street standards in cities.
The second term, are transformations, where the concept of transformation and its patterns and
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreThe concept of fuzzy orbit open sets under the mapping
In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.
ان الغرض من هذا البحث هو المزج بين القيود الضبابية والاحتمالية. كما يهدف الى مناقشة اكثر حالات مشكلات البرمجة الضبابية شيوعا وهي عندما تكون المشكلة الضبابية تتبع دالة الانتماء مرة دالة الاتنماء المثلثية مرة اخرى، من خلال التطبيق العملي والتجريبي. فضلا عن توظيف البرمجة الخطية الضبابية في معالجة مشكلات تخطيط وجدولة الإنتاج لشركة العراق لصناعة الأثاث، وكذلك تم استخدام الطرائق الكمية للتنبؤ بالطلب واعتماده
... Show MoreWe introduce and discuss the modern type of fibrewise topological spaces, namely fibrewise fuzzy topological spaces. Also, we introduce the concepts of fibrewise closed fuzzy topological spaces, fibrewise open fuzzy topological spaces, fibrewise locally sliceable fuzzy topological spaces and fibrewise locally sectionable fuzzy topological spaces. Furthermore, we state and prove several theorems concerning these concepts.
Emails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep