Preferred Language
Articles
/
jeasiq-988
Scheduling Critical Activities of Stochastic Projects Management
...Show More Authors

In this paper, we consider the problem of stochastic project network when some or all activities are interrupted. An approach has been built to schedule the critical activities, by constructing some expressions based on the project lateness costs due to the interruption activities. Two simple example are presented to validate our approach.

Key words: Project Management, Project scheduling, Stochastic activity duration, Stochastic PERT.    

Introduction

   Recently, Projects planning and optimal timing, under uncertainty are extremely critical for many organizations, see [19]. Having an effective mathematical model will give project managers a significant tool for replanning projects allocation decisions in response events and outcomes. As a result, the uncertainty associated with such risky projects should be reduced.     

  No one factor can account for, or prevent, failure in a project. It is common practice for a project team to develop a comprehensive risk assessment and risk management plan. Identifying the most critical activities with regard to schedule risk is a problem faced by all project managers.

  The problem of identifying critical activities (CA) in a deterministic network is well understood, by standard Critical Path Method (CPM) known as Program Evaluation and Review Technique (PERT). Since a project could be delayed if these activities were not completed in the scheduled time. The classical PERT method is the probably is the best-known mechanism for considering the stochastic nature of activity durations, in which it is possible to develop estimates of the uncertainty of the project make span. For more details see [8] & [10 ].

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an educational program on nurses' knowledge regarding management of extravasation vesicant intravenous chemotherapy at oncology centers in Baghdad city
...Show More Authors

Objectives: to determine the effectiveness of an Education Program on Nurses' Knowledge regarding management of extravasation vesicant intravenous chemotherapy

Methodology: quiz-experimental study (single-group pretest-posttest1 and posttest2) was directed in Amal oncology center and national oncology center in Baghdad city from 13th, December 2018 to the 7 of February 2019. The program and tool have been created by the researcher for the purpose of the study. A non- probability purposive sample of (40) nurses who employed in Baghdad oncology centers. Validity and reliability of the instrument were determined through a pilot study. Data were analyzed through the use of Statistical Pack

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 12 2021
Journal Name
Systematic Review In Pharmacy
CUPPER(||)AND MERCURY (||)Complexes WITH SCHIFF BASE LIGAND FROM BENZIDIN WITH ISATIN AND BENZOIN:SYNTHESIS,SPECTRAL CHARACTERIZATION, THERMAL STUDIES AND BIOLOGICAL ACTIVITIES
...Show More Authors

CUPPER(||)AND MERCURY (||)Complexes WITH SCHIFF BASE LIGAND FROM BENZIDIN WITH ISATIN AND BENZOIN:SYNTHESIS,SPECTRAL CHARACTERIZATION, THERMAL STUDIES AND BIOLOGICAL ACTIVITIES

Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Electronic government and its effect in reducing Management Corruption: دراسة استطلاعية في دائرة المرور العامة (الإجازات)
...Show More Authors

In view of the huge and speedy development of the information and communications technology sectores which cover all the life aspects. The traditional government started to adopt the Electronic Government Concept to deliver the information, services and product marketing to the beneficiaries through the Internet and Computer system. The E-government became inevitable necessity that should be applied in every country wishes to face the Modern technical development.

E-government is not on alternative of the traditional government but a supporter which can increase its efficiency by keeping away from the routine and Beaurucratic complexity, this will save the efforts, increase achievement and reduce costs, in addition to Provide Man

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Measure the level of banking performance in accordance with the e-marketing and total quality management requirements
...Show More Authors

Acquires Find importance of the overall quality and e-marketing management have become important factors in evaluating the performance of banks, which are related to the life of the community intimately, so it is important that the banks applying comprehensive quality and e-marketing management requirements in order to maintain their performance and determine their level, as well as the manifest importance of research in part, practical linking the requirements of total quality management and banking performance on the one hand and between the e-marketing and performance banking on the other hand, through the provision of scientific bases that can be based on the banks in question, as it kicks off the research problem in that mos

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluation of Risk Management practices and their relationship to the Entrepreneur behavior of managers in insurance companies: applied research
...Show More Authors

The objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Current Medicinal Chemistry
Synthesis, In Silico Prediction, and In Vitro Evaluation of Anti-tumor Activities of Novel 4'-Hydroxybiphenyl-4-carboxylic Acid Derivatives as EGFR Allosteric Site Inhibitors
...Show More Authors
Introduction:

Allosteric inhibition of EGFR tyrosine kinase (TK) is currently among the most attractive approaches for designing and developing anti-cancer drugs to avoid chemoresistance exhibited by clinically approved ATP-competitive inhibitors. The current work aimed to synthesize new biphenyl-containing derivatives that were predicted to act as EGFR TK allosteric site inhibitors based on molecular docking studies.

Methods:

A new series of 4'-hydroxybiphenyl-4-carboxylic acid derivatives, including hydrazine-1-carbothioamide (S3-S6) and 1,2,4-triazole (S7-S10) derivatives, were synthesized and characterized using IR, 1HNMR, 13CNMR

... Show More
View Publication
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Very Large Scale Integration (vlsi) Systems
Low-Power, Highly Reliable Dynamic Thermal Management by Exploiting Approximate Computing
...Show More Authors

With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF