For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers schedule efficient ways to deliver product orders to recipients. Based on testing, the Dijkstra algorithm that has been included in the nearest route search function for the delivery process has worked well. This system is expected to improve the efficient management and delivery of orders.
Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost
... Show MoreAbstract
This research aims to determine the nature of tacit knowledge relationship and its impact on building the electronic human resources management, as it constitutes the most prominent tacit knowledge resources owned by the Organization for being a stand out in the skill, knowledge and intellectual capacity of human resources, as the electronic human resources management is a contemporary trend that adopted by the organization in the performance of all tasks and duties related workers have remained in the contemporary environment in which it operates.
and have indicated the research problem to the low level of awareness of the ad
... Show MoreIt is an analytical study carried out at university of Basra using a sample included the dean ,assistants and managers of scientific dept. in the university for about(63)managers .The study aimed at discovering a model of crises management in the university.The researcher adopted the descriptive survey methodology.To achieve the objective of the study ,a questionnaire of (41)statements was developed covering five main variables like ,signal detection, prevention and preparedness, response, recovery and learning .The validity of the questionnaire was done by a group of referees .Its stability was determined by Cronbach,s Alfa .The questionnair,s stability coefficient was(0.
... Show MoreAlthough severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
AW Tarik, AW Ali T, A Salah, Journal of faculity of medicine Baghdad university, 2014 - Cited by 3
Objectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a
... Show MoreThis study aimed at recognizing the impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan, the axes of the strategy were: informative sharing, free and independence, working teams, and organizational power. To achieve the objective of the study, a questionnaire is designed and distributed on the sample of the study, which represented 60 employees of Banks. After analyzing the data by using SPSS, the study resulted that there is positive impact of empowerment of human resources strategy on enhancing the financial performance in working banks in Jordan. It suggested that the working banks in Jordan should establish database, and to create working teams.
... Show MoreCzerwi’nski et al. introduced Lucky labeling in 2009 and Akbari et al and A.Nellai Murugan et al studied it further. Czerwi’nski defined Lucky Number of graph as follows: A labeling of vertices of a graph G is called a Lucky labeling if for every pair of adjacent vertices u and v in G where . A graph G may admit any number of lucky labelings. The least integer k for which a graph G has a lucky labeling from the set 1, 2, k is the lucky number of G denoted by η(G). This paper aims to determine the lucky number of Complete graph Kn, Complete bipartite graph Km,n and Complete tripartite graph Kl,m,n. It has also been studied how the lucky number changes whi
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More