The implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiveness of the results, especially with the introduction of software programs. The study concluded with a number of conclusions, including the delay of most of the projects for their specific times for several reasons, the most important of which is the lack of good planning and scheduling suitable to increase the number and variety of projects, as well as the possibility of reducing the time of completion of the project, And the most important recommendations of the research urged the departments of the municipality and government agencies and committees to prepare the drafts of guessing projects, as well as the companies and contractors, using modern methods and software in the scheduling of projects, and control the time in planning and scheduling projects to ensure that not delayed Properly on time.
Abstract: Various peoples have contributed to building the Islamic civilization through the achievements and creativity of their scholars. In particular, the Kurdish scholars have provided new and great services to the Holy Qur’an that deserves attention. For example, it is no secret that Sheikh Ahmadian, with his interpretation, rendered a great service to the Glorious Book of God. His style is distinguished by modernity, seriousness and objectivity, and represents a lively response to the needs of the Kurdish Muslim people. Due to the importance of Ahmadian’s interpretation of the Qur’an, therefore, I have demonstrated his approach in this research in terms of dealing with his interpretation of the Qur’an with the Qur’an, the
... Show MoreThe aim of the research is to identify the reality of administrative motivation for the deans of the faculties of physical education and sports sciences at the universities of Baghdad and Al-Mustansiriya from the point of download of the faculty members. The number of the exploratory sample was (7) faculty members, they were taken in a random way, while the rest of the sample number was (150) faculty members who considered the application sample for the scale, and the two researchers also adopted a questionnaire for the scale and it is applied to the Iraqi environment. phrase, which are phrases that are interrelated with the administrative leadership motivation in the faculties of physical education and sports sciences. The researchers did
... Show MoreThe problem of this research is:
What are the sustainable development goals that received the priority in the press addressing of the newspapers under study?
What are the journalistic arts adopted by these newspapers in addressing the sustainable development goals?
What are the journalistic sources that Arab newspapers depended on when addressing the sustainable development goals?
What are the geographic range the Arab newspapers adopted in addressing the sustainable development goals? The research is categorized into descriptive research, adopting the survey method, and using the content analysis method.
The sample of research was determined by the preparation of the Arabic newspapers (Al-
... Show MoreObjectives of the study: The present study aims to evaluate nurses’ knowledge about enteral feeding in critical care units.
Methodology
A descriptive study design was carried out in the critical care units at Al-Ramadi Teaching Hospital and Al-Fallujah Teaching Hospital of Al-Anbar Governorate for the period 6th of December 2020 to 5th of January 2021. A non-probability (purposive sample) consists of 32 nurses was selected based on the study criteria. The instrument consist of, the reliability of instrument was = 0.87.
The instrument consist of 30 items of knowledge about enteral
... Show MoreA comparison of double informative and non- informative priors assumed for the parameter of Rayleigh distribution is considered. Three different sets of double priors are included, for a single unknown parameter of Rayleigh distribution. We have assumed three double priors: the square root inverted gamma (SRIG) - the natural conjugate family of priors distribution, the square root inverted gamma – the non-informative distribution, and the natural conjugate family of priors - the non-informative distribution as double priors .The data is generating form three cases from Rayleigh distribution for different samples sizes (small, medium, and large). And Bayes estimators for the parameter is derived under a squared erro
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show More