Preferred Language
Articles
/
jeasiq-741
Project Scheduling By using Goals Programming – An Applied Research In Modern Village Project (Residential Building Aspectin In Wasit Governorate)
...Show More Authors

One of the most important challenges facing project management at present time is to ensure project accomplishment in spite of the specific restrictions like the specific time the financial resources specialized to do the project ; which require an accurate consideration for time and cost . the modern village project (residential building aspect) is one of the great project that ministry of agriculture is trying to do Wasit  governorate it is chosen as the work in this project is dilatory for that is being studied in term of some modern mathematical and scientific methods like critical path method (CPM)which is one of the project management and scheduling methods to know the time needed to accomplish residential building project , with acknowledgement that many activities of project net are of unconventional relations among each others (of type finish to start) ; and there are periods of (lead and lag) among each other for that reason , (primavera V6) program is used in project scheduling and management which is one of prime programs to find the time and cost of project accomplishment at normal and crash states ; and as project management has numerous goals , same of them are contradictory which are trying to do in one time and that require great working and decision-makers face difficulty to reach into accurate and  suitable decisions (goal programming) method is used which is one of efficient and mathematical method to achieve the objectives the results obtained of the mathematical model solution with the use of (win Q.S.B V2) program show the importance and efficiency of this method in modern village project scheduling (residential building aspect) under numerous contrasted goal that project management determined according to their importance and to be achieved according to their importance and to be achieved in one time

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
An Efficient Cryptosystem for Image Using 1D and 2D Logistic Chaotic Maps
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Design of an Electron Gun Using two Electrod Low Aberration Immersion Lens
...Show More Authors

Abstract
A two electrode immersion electrostatic lens used in the design
of an electron gun, with small aberration, has been designed using
the finite element method (FEM). By choosing the appropriate
geometrical shape of there electrodes the potential V(r,z) and the
axial potential distribution have been computed using the FEM to
solve Laplace's equation.
The trajectory of the electron beam and the optical properties of
this lens combination of electrodes have been computed under
different magnification conditions (Zero and infinite magnification
conditions) from studying the properties of the designed electron
gun can be supplied with Abeam current of 5.7*10-6 A , electron
gun with half acceptance

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 31 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Credit Card Fraud Detection Using an Autoencoder Model with New Loss Function
...Show More Authors

View Publication
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Fire
An Efficient Wildfire Detection System for AI-Embedded Applications Using Satellite Imagery
...Show More Authors

Wildfire risk has globally increased during the past few years due to several factors. An efficient and fast response to wildfires is extremely important to reduce the damaging effect on humans and wildlife. This work introduces a methodology for designing an efficient machine learning system to detect wildfires using satellite imagery. A convolutional neural network (CNN) model is optimized to reduce the required computational resources. Due to the limitations of images containing fire and seasonal variations, an image augmentation process is used to develop adequate training samples for the change in the forest’s visual features and the seasonal wind direction at the study area during the fire season. The selected CNN model (Mob

... Show More
View Publication
Scopus (27)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Feb 05 2020
Journal Name
Political Sciences Journal
Neutrality in Swedish foreign policy , an analytical study of adaption from traditional neutrality to military non-alignment
...Show More Authors

Abstract Sweden is today one of the most active European countries in the regional and international environment despite the adoption of neutrality as a guiding principle in its foreign policy. For more than two centuries, the length of time for Swedish neutrality has made it a global standard, an agreed foreign policy at home and a political culture rooted in institutions and society. Swedish. Although discussions are still underway on Swedish security and foreign policies after the end of the Cold War, especially cooperation with NATO through the Partnership for Peaceprogram, EU accession and its impact on the principle of neutrality in foreign policy. Sweden, however, insists that it still maintains neutrality, but more adequately, in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Authentic Leadership In Business Process Reengineering
...Show More Authors

Abstract  :

The present study aims at identifying the status of the two research variables in the organization under study and specifying the relationship and impact of the authentic leadership with all its four branch dimensions of (self-awareness, transparent relations, balanced processing of information and the moral perspective) on business process reengineering.

The basic problem of the study lies in the attempt to present a new leadership style that is more responsive to the dynamic changes surrounding it based on the authentic leadership behaviors. This is because this pattern has an impact on the nature of the organization's work and its progress.

The research

... Show More
View Publication Preview PDF
Crossref (1)
Crossref