At a time of increasing human potential in the face of crises and risks through the use of technology on a large scale and steadily in various fields of life, and the vulnerability of business organizations as a result of mistakes. The failure of a sudden these errors or omissions or symptoms. Also, some crises occur outside the control of management, others caused by leakage of important information and sometimes secret may be a strategy or a new plan or new project occurs outside the organization to the opposite of what is planned. Therefore, the crisis management are critical to all organizations, because the active management of the crisis helps to ensure the continued prosperity of the organization. Here comes from the resea
... Show MoreAbstract
This work involves studying the effect of adding some selective organic component mixture on corrosion behavior of pure Al and its alloys in condensed synthetic automotive solution (CSAS) at room temperature. This mixture indicates the increasing of octane number in previous study and in this study show the increasing in corrosion resistance through the decreasing in corrosion rate values.
Electrochemical measurements were carried out by potentiostat at 3 mV/sec to estimate the corrosion parameters using Tafel extrapolation method, in addition to cyclic polarization test to know the pitting susceptibility of materials in tested medium.
The cathodic Tafel slope
... Show MoreDue to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThis study was conducted in the Tissue Culture laboratory of the Horticultural Department of the Faculty of Agriculture at Karbala University to investigate the effects of a light source (Florescent, LED) and adenine sulfate (Ads) a 0, 40, 80, and 120 mg l-1 on the multiplication and rooting of
OpenStreetMap (OSM) represents the most common example of online volunteered mapping applications. Most of these platforms are open source spatial data collected by non-experts volunteers using different data collection methods. OSM project aims to provide a free digital map for all the world. The heterogeneity in data collection methods made OSM project databases accuracy is unreliable and must be dealt with caution for any engineering application. This study aims to assess the horizontal positional accuracy of three spatial data sources are OSM road network database, high-resolution Satellite Image (SI), and high-resolution Aerial Photo (AP) of Baghdad city with respect to an analogue formal road network dataset obtain
... Show MorePurpose: The main objective of this paper is, to determine the optimal no. of technicians’ men in a workshop crew of an Industrial System. Theoretical framework: The purpose of applying these tools is to explore their ability to reduce costs and improvements that can be obtained in the process of providing services to the end customer. Design/methodology/approach: The literature structure review was built from analyzing 12 of scientific papers and books, from web sciences and the Elsevier database. The papers were analyzed from descriptive, methodologic, and citation characteristics. Finding: By applying the equation model of the paper, the optimal no. of technician men in the crew of the workshop can be determined when
... Show MoreThe majority of real-world problems involve not only finding the optimal solution, but also this solution must satisfy one or more constraints. Differential evolution (DE) algorithm with constraints handling has been proposed to solve one of the most fundamental problems in cellular network design. This proposed method has been applied to solve the radio network planning (RNP) in the forthcoming 5G Long Term Evolution (5G LTE) wireless cellular network, that satisfies both deployment cost and energy savings by reducing the number of deployed micro base stations (BSs) in an area of interest. Practically, this has been implemented using constrained strategy that must guarantee good coverage for the users as well. Three differential evolution
... Show MoreIn this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the
... Show MoreSoftware cost management is a significant feature of project management. As such, it needs to be employed in a project or line of work. Software cost management is integral to software development failures, which, in turn, cause software failure. Thus, it is imperative that software development professionals develop their cost management skills to deliver successful software projects. The aim of this study is to examine the impact of cost management success factors with project management factors and three agile methodologies – Extreme Programming (XP), Scrum and Kanban methodologies which are used in the Pakistani software industry. To determine the results, the researchers applied quantitative approach through an extensive survey on
... Show More