Preferred Language
Articles
/
jeasiq-988
Scheduling Critical Activities of Stochastic Projects Management
...Show More Authors

In this paper, we consider the problem of stochastic project network when some or all activities are interrupted. An approach has been built to schedule the critical activities, by constructing some expressions based on the project lateness costs due to the interruption activities. Two simple example are presented to validate our approach.

Key words: Project Management, Project scheduling, Stochastic activity duration, Stochastic PERT.    

Introduction

   Recently, Projects planning and optimal timing, under uncertainty are extremely critical for many organizations, see [19]. Having an effective mathematical model will give project managers a significant tool for replanning projects allocation decisions in response events and outcomes. As a result, the uncertainty associated with such risky projects should be reduced.     

  No one factor can account for, or prevent, failure in a project. It is common practice for a project team to develop a comprehensive risk assessment and risk management plan. Identifying the most critical activities with regard to schedule risk is a problem faced by all project managers.

  The problem of identifying critical activities (CA) in a deterministic network is well understood, by standard Critical Path Method (CPM) known as Program Evaluation and Review Technique (PERT). Since a project could be delayed if these activities were not completed in the scheduled time. The classical PERT method is the probably is the best-known mechanism for considering the stochastic nature of activity durations, in which it is possible to develop estimates of the uncertainty of the project make span. For more details see [8] & [10 ].

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Ieee Transactions On Very Large Scale Integration (vlsi) Systems
Low-Power, Highly Reliable Dynamic Thermal Management by Exploiting Approximate Computing
...Show More Authors

With the continuous downscaling of semiconductor processes, the growing power density and thermal issues in multicore processors become more and more challenging, thus reliable dynamic thermal management (DTM) is required to prevent severe challenges in system performance. The accuracy of the thermal profile, delivered to the DTM manager, plays a critical role in the efficiency and reliability of DTM, different sources of noise and variations in deep submicron (DSM) technologies severely affecting the thermal data that can lead to significant degradation of DTM performance. In this article, we propose a novel fault-tolerance scheme exploiting approximate computing to mitigate the DSM effects on DTM efficiency. Approximate computing in hardw

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Information Systems And Change Management
Designing a knowledge management measurement for educational institutions: a qualitative research
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (17)
Crossref (17)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (49)
Crossref (45)
Scopus Clarivate Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Current Pharmaceutical Design
Dry Eye Disease: Present Challenges in the Management and Future Trends
...Show More Authors

View Publication
Scopus (40)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Electronic government and its effect in reducing Management Corruption: دراسة استطلاعية في دائرة المرور العامة (الإجازات)
...Show More Authors

In view of the huge and speedy development of the information and communications technology sectores which cover all the life aspects. The traditional government started to adopt the Electronic Government Concept to deliver the information, services and product marketing to the beneficiaries through the Internet and Computer system. The E-government became inevitable necessity that should be applied in every country wishes to face the Modern technical development.

E-government is not on alternative of the traditional government but a supporter which can increase its efficiency by keeping away from the routine and Beaurucratic complexity, this will save the efforts, increase achievement and reduce costs, in addition to Provide Man

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an educational program on nurses' knowledge regarding management of extravasation vesicant intravenous chemotherapy at oncology centers in Baghdad city
...Show More Authors

Objectives: to determine the effectiveness of an Education Program on Nurses' Knowledge regarding management of extravasation vesicant intravenous chemotherapy

Methodology: quiz-experimental study (single-group pretest-posttest1 and posttest2) was directed in Amal oncology center and national oncology center in Baghdad city from 13th, December 2018 to the 7 of February 2019. The program and tool have been created by the researcher for the purpose of the study. A non- probability purposive sample of (40) nurses who employed in Baghdad oncology centers. Validity and reliability of the instrument were determined through a pilot study. Data were analyzed through the use of Statistical Pack

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Pharmacia
Synthesis, docking study, and structureactivity relationship of novel niflumic acid derivatives acting as anticancer agents by inhibiting VEGFR or EGFR tyrosine kinase activities
...Show More Authors

Scopus (18)
Scopus