This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the application of the most prominent methods of plans Network (Gantt Chart, CPM, PERT), in planning and scheduling project activities and using computer programs related to network planning methods, especially (MS Project) and (Win QSB) program in determining the nature of relationships and interdependence between activities and processing data for the project to obtain results and draw Project networks The study reached a set of results, the most important of which is when applying network planning methods. This led to a reduction in the project completion time. Reliance on the CPM method and at the same cost allocated under normal conditions to (803) days, but in the case of accelerating the total project, the completion period is (643) days, and when adopting the PERT method, the total period of completion according to the project data is (796) day with a probability ratio of (0.43).
PC-based controller is an approach to control systems with Real-Time parameters by controlling selected manipulating variable to accomplish the objectives. Shell and tube heat exchanger have been identified as process models that are inherently nonlinear and hard to control due to unavailability of the exact models’ descriptions. PC and analogue input output card will be used as the controller that controls the heat exchanger hot stream to the desired temperature.
The control methodology by using four speed pump as manipulating variable to control the temperature of the hot stream to cool to the desired temperature.
In this work, the dynamics of cross flow shell and tube heat exchanger is modeled from step changes in cold water f
Background: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertili
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
Binuclear copper, nickel, cobalt, manganese and mercury complexes of the Schiff base H2L (C40H28N2O4) obtained by condensation of 2-benzoyl benzoic acid with benzidine. The Schiff base and their complexes have been subjected to[ FT-IR, elemental analysis ,UV-Vis, 1H and 13C NMR ] spectral studies, molar conductivity, magnetic moment and HPLC measurements. All the complexes showed tetrahedral geometries with the general structure [M2(L)2]. Generality of the synthesized components offer antibacterial efficiency to (Staphylococcu saureus), (Escherichia coli),(Bacillus subtilis) and(Pseudomonas aeruginosa).
This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The main purpose of this paper is to study some results concerning reduced ring with another concepts as semiprime ring ,prime ring,essential ideal ,derivations and homomorphism ,we give some results a bout that.
In this paper, we introduce and study the concept of S-coprime submodules, where a proper submodule N of an R-module M is called S-coprime submodule if M N is S-coprime Rmodule. Many properties about this concept are investigated.
Let L be a commutative ring with identity and let W be a unitary left L- module. A submodule D of an L- module W is called s- closed submodule denoted by D ≤sc W, if D has no proper s- essential extension in W, that is , whenever D ≤ W such that D ≤se H≤ W, then D = H. In this paper, we study modules which satisfies the ascending chain conditions (ACC) and descending chain conditions (DCC) on this kind of submodules.
Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show More