Preferred Language
Articles
/
jeasiq-988
Scheduling Critical Activities of Stochastic Projects Management
...Show More Authors

In this paper, we consider the problem of stochastic project network when some or all activities are interrupted. An approach has been built to schedule the critical activities, by constructing some expressions based on the project lateness costs due to the interruption activities. Two simple example are presented to validate our approach.

Key words: Project Management, Project scheduling, Stochastic activity duration, Stochastic PERT.    

Introduction

   Recently, Projects planning and optimal timing, under uncertainty are extremely critical for many organizations, see [19]. Having an effective mathematical model will give project managers a significant tool for replanning projects allocation decisions in response events and outcomes. As a result, the uncertainty associated with such risky projects should be reduced.     

  No one factor can account for, or prevent, failure in a project. It is common practice for a project team to develop a comprehensive risk assessment and risk management plan. Identifying the most critical activities with regard to schedule risk is a problem faced by all project managers.

  The problem of identifying critical activities (CA) in a deterministic network is well understood, by standard Critical Path Method (CPM) known as Program Evaluation and Review Technique (PERT). Since a project could be delayed if these activities were not completed in the scheduled time. The classical PERT method is the probably is the best-known mechanism for considering the stochastic nature of activity durations, in which it is possible to develop estimates of the uncertainty of the project make span. For more details see [8] & [10 ].

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 26 2020
Journal Name
Journal Of Global Pharma Technology
Synthesis, Characterization of 2-azido-4-(azido (2-azido-2-( azido carbonyl)-1,3-dioxoian-4-yl)methyl)– 5-((R-azido (hydroxyl) methyl- 1,3-dioxole-2-carbonyl azide. ethanol. hydrate (L-AZD) with Some Metal Complexes
...Show More Authors

The reaction oisolated and characterized by elemental analysis (C,H,N) , 1H-NMR, mass spectra and Fourier transform (Ft-IR). The reaction of the (L-AZD) with: [VO(II), Cr(III), Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Hg(II)], has been investigated and was isolated as tri nuclear cluster and characterized by: Ft-IR, U. v- Visible, electrical conductivity, magnetic susceptibilities at 25 Co, atomic absorption and molar ratio. Spectroscopic evidence showed that the binding of metal ions were through azide and carbonyl moieties resulting in a six- coordinating metal ions in [Cr (III), Mn (II), Co (II) and Ni (II)]. The Vo (II), Cu (II), Zn (II), Cd (II) and Hg (II) were coordinated through azide group only forming square pyramidal

... Show More
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Spectral Studies on Cobalt(II), Nickel(II), Copper(II), Palladium(II), Platinum(II, IV), Zinc(II), Cadmium(II) and Mercury(II) Complexes of(1, 2-diaminoethane-N,N'-bis(2- butylidine-3 onedioxime)
...Show More Authors

The synthesis of [1,2-diaminoethane-N,N'-bis(2-butylidine-3- onedioxime)] [II2L] and its cobalt(II), nickel(II), copper(II), palladium(II), platinum(II, IV), zinc(II), cadmium(II) and mercury(II) complexes is reported. The compounds were characterised by elemental analyses, spectroscopic methods [I.R, UV-Vis, ('H NMR. and EI mass for H2L)], molar conductivities, magnetic moments. I.R. spectra show that (H2L) behaves as a neutral or mononegative ligand depending on the nature of the metal ions. The molar conductance of the complexes in (DMSO) is commensurate with their ionic character. On the basis of the above measurements, a square planar geometry is proposed for NOD, Pd(II), and Pt(II) complexes, and an octahedr-al structure with trans

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Experimental Investigation Utilizing Thermal Image Technique to the Heat Transfer Enhancement Using Oscillated Fins
...Show More Authors

Heat transfer around a flat plate fin integrated with piezoelectric actuator used as oscillated fin in laminar flow has been studied experimentally utilizing thermal image camera. This study is performed
for fixed and oscillated single and triple fins. Different substrate-fin models have been tested, using fins of (35mm and 50mm) height, two sets of triple fins of (3mm and 6mm) spacing and three frequencies
applied to piezoelectric actuator (5, 30 and 50HZ). All tests are carried out for (0.5 m/s and 3m/s) in subsonic open type wind tunnel to evaluate temperature distribution, local and average Nusselt number (Nu) along the fin. It is observed, that the heat transfer enhancement with oscillation is significant compared to without o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Al-dhad Book Store And Publishing
Calculus part 2
...Show More Authors

This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Mon Jan 01 2018
Journal Name
Al-dhad Book Store And Publishing
Calculus part 1
...Show More Authors

This book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.

Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 02 2021
Journal Name
Psychology And Education Journal
References for Receiving Explicit and Implicit Knowledge in the Holy Quran
...Show More Authors

The research aims to explain the References of receiving the explicit and implicit knowledge mentioned in the Noble Qur'an. The two researchers adopted the documentary and inductive approach to study the topic. Among the conclusions of the research: The Noble Qur'an dealt with many terms and concepts that refer to the References of making explicit knowledge available, including books, which were represented by the divine books (the Qur'an, the Torah, the Zabur and the Gospel) and their concepts (the book, the Qur'an, the guidance, the remembrance, the revelation, the light, the newspapers, the plates). He dealt with many concepts that refer to the References of providing tacit knowledge, which was represented by the communication between tw

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Amino Acids as Environmentally-Friendly Corrosion Inhibitors for 2024 Aluminium Alloy in Akaline Medium
...Show More Authors

The corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ

... Show More
View Publication Preview PDF