In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and then used another method, the method of time-cost exchange (TCT), which is one of the important techniques used by the project manager to shorten the time of completion of the project at the lowest cost has been achieved This method reduced the implementation time of the project by a large percentage. The results showed that the implementation period was reduced from (1309.5) days to (1224.2) days, and the cost of completion of (33353514407) dinars, an increase of (240496638) dinars.
The aim of this study is to highlight the relationship between competitive intelligence and Entrepreneurial Performance by centralizing the strategic vigilance of a sample of civil faculties in Baghdad. The sample of the study was targeted at 10 Iraqi civil colleges, which consisted of (133) members of the faculty council of the faculties, the search data was collected using the questionnaire form as the main research tool. The results showed that the correlation and influence of competitive intelligence and strategic vigilance in the Entrepreneurial Performance, as well as the role of strategic vigilance as an intermediate variable between competitive intelligence and Entrepreneurial Performance.
In this study, ultraviolet (UV), ozone techniques with hydrogen peroxide oxidant were used to treat the wastewater which is produced from South Baghdad Power Station using lab-scale system. From UV-H2O2 experiments, it was shown that the optimum exposure time was 80 min. At this time, the highest removal percentages of oil, COD, and TOC were 84.69 %, 56.33 % and 50 % respectively. Effect of pH on the contaminants removing was studied in the range of (2-12). The best oil, COD, and TOC removal percentages (69.38 %, 70 % and 52 %) using H2O2/UV were at pH=12. H2O2/ozone experiments exhibited better performance compared to
... Show MoreThis paper provides an identification key to the species of Orthetrum Newman, 1833 (Odonata, Libellulidae), including six species that were collected from different localities in Iraq.
The species of O. anceps (Schneider, 1845) is registered as a new record in Iraq; the most important characters which are used in diagnostic key are included
This study is concerned with the concept of offering a point of view as a narrative construction element, especially the element and point of view of the novel to the letter Alcinmatugrave both business taken from masterpieces and literary works in the foundation or set of cinema. On the whole, the narrator participate in mock narrative process and support the narrator visual image, especially stories that need to exist scenes prove added to the image that uses signs of reality to take those marks a new dimension not only across the image, but also the intervention of the narrator in the re-formation of this realism marks surrounding Palms perceived and visible and put markers regularly between what the narrative of privacy and image, fo
... Show MoreThis study proposes a hybrid predictive maintenance framework that integrates the Kolmogorov-Arnold Network (KAN) with Short-Time Fourier Transform (STFT) for intelligent fault diagnosis in industrial rotating machinery. The method is designed to address challenges posed by non-linear and non-stationary vibration signals under varying operational conditions. Experimental validation using the FALEX multispecimen test bench demonstrated a high classification accuracy of 97.5%, outperforming traditional models such as SVM, Random Forest, and XGBoost. The approach maintained robust performance across dynamic load scenarios and noisy environments, with precision and recall exceeding 95%. Key contributions include a hardware-accelerated K
... Show More‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural his
The study aims at finding out the effect of the lead time strategy on the first intermediate class pupils' achievement in geography The partial experimental design of two groups, experimental and control, with pre-post tests is used. The sample is represented in (73) female pupils. The sample is divided into two groups (37) experimental group and (36) control one. The sam ple is selected from first intermediate class pupils ( Al Batol intermediate school for girls) Baghdad Al-karkh-3, for academic year 2015-2016 The researcher has equalized the two groups in several variables: the previous achievement tests, intelligence, age in months, the scores of geography test of first course
The rapid and enormous growth of the Internet of Things, as well as its widespread adoption, has resulted in the production of massive quantities of data that must be processed and sent to the cloud, but the delay in processing the data and the time it takes to send it to the cloud has resulted in the emergence of fog, a new generation of cloud in which the fog serves as an extension of cloud services at the edge of the network, reducing latency and traffic. The distribution of computational resources to minimize makespan and running costs is one of the disadvantages of fog computing. This paper provides a new approach for improving the task scheduling problem in a Cloud-Fog environme
The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More