Preferred Language
Articles
/
joe-168
Mismanagement Reasons of the Projects Execution Phase
...Show More Authors

The execution phase  of the project is most dangerous and the most drain on the resources during project life cycle, therefore, its need to monitor and control by specialists to exceeded obstructions and achieve the project goals. The study aims to detect the actual reasons behind mismanagement of the execution phase. The study begins with theoretical part, where it deals with the concepts of project, project selection, project management, and project processes. Field part consists of three techniques: 1- brainstorming, 2- open interviews with experts and 3- designed questionnaire (with 49 reason. These reasons result from brainstorming and interviewing with experts.), in order to find the real reasons behind mismanagement of the execution phase. The most important reasons which are negatively impact on management of the execution phase that proven by the study were (Inability of company to meet project requirements because it's specialized and / or large project, Multiple sources of decision and overlap in powers, Inadequate planning, Inaccurate estimation of cost, Delayed cash flows by owners, Poor performance of project manager, inefficient decision making process, and the Negative impact of people in the project area). Finally, submitting a set of recommendations which will contribute to overcome the obstructions of successful management of the execution phase.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Mon Nov 11 2024
Journal Name
Jurnal Teknologi (sciences & Engineering)
THE EXTERNAL DRAFT TUBE GASLIFT BIOREACTOR: HYDRODYNAMIC CHARACTERISTICS AND PARAMETRIC OPTIMIZATION
...Show More Authors

Gaslift reactors are employed in several bioapplications due to their characteristics of cost-effectiveness and high efficiency. However, the nutrient and thermal gradient is one of the obstacles that stand in the way of its widespread use in biological applications. The diagnosis, analysis, and tracking of fluid paths in external draft tube gaslift bioreactor-type are the main topics of the current study. Several parameters were considered to assess the mixing efficiency such as downcomer-to-rizer diameter ratio (Ded/Dr), the position of the diffuser to the height of bioreactor ratio (Pd/Lr), and gas bubble size (Db). The multiple regression of liquid velocity indicates the optimal setting: Ded/Dr is (0.5), Pd/Lr is (0.02), and Db

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public sector in Iraq Transition and partnership with the private sector
...Show More Authors

  The role of the public sector- Investment customizations-  economic embargo -  The role of the private sector - Coexistence between the public and private sectors -   Ratio of growth

View Publication
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role Tourism in achieving Economic Development in Iraq (1990 – 2015)
...Show More Authors

Abstract

       Tourism is one of the essential economic fields of many countries, both developed and developing. The social plays a greater role in the continuous awareness of a tourist culture based on the need to attract tourists continuously. the tourism heritage and state-owned tourism are the main factors in attracting more tourists. The interest in this strategic sector makes the country the first and most active framework in the development of appropriate mechanisms for investment in this sector, all within the framework of sustainable development of society through the rational use of resources obtained by various bodies in the implementation of seve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
Time Aesthetics in the Documentary Film: حسام الدين محمد عبد المنعم
...Show More Authors

The research dealt with the study of the element of time in the cinematic language and the role it plays in creating the aesthetic meanings in the documentary film by means of the various structural constructions with which time is constructed. The research included the introduction and the problem of research, which was represented by the following question: (Did the documentary film adopt the values of time formats in the fiction film or it created for itself special linguistic formulations and models which achieve the aesthetic concept?). It also included the importance of research, the need for it and its goal in addition to clarifying the limits of research.The theoretical framework included three sections the first of which is the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Developing a Real Time Method for the Arabic Heterogonous DBMS Transformation
...Show More Authors

   A common problem facing many Application models is to extract and combine information from multiple, heterogeneous sources and to derive information of a new quality or abstraction level. New approaches for managing consistency, uncertainty or quality of Arabic data and enabling e-client analysis of distributed, heterogeneous sources are still required. This paper presents a new method by combining two algorithms (the partitioning and Grouping) that will be used to transform information in a real time heterogeneous Arabic database environment

View Publication Preview PDF
Publication Date
Thu Apr 23 2020
Journal Name
Al-qadisiyah Journal Of Pure Science
The ESTIMATING MARRIAGE AND DIVORCES AND COMPARING THEM USING NUMERICAL METHOD. . .
...Show More Authors

In this paper, we describe the cases of marriage and divorce in the city of Baghdad on both sides of Rusafa and Karkh, we collected the data in this research from the Supreme Judicial Council and used the cubic spline interpolation method to estimate the function that passing through given points as well as the extrapolation method which was applied for estimating the cases of marriage and divorce for the next year and comparison between Rusafa and Karkh by using the MATLAB program.

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
HOTTENTOTTA POOYANI SP. NOV. (SCORPIONES, BUTHIDAE) FROM THE KHUZESTAN PROVINCE, IRAN
...Show More Authors

A new species, Hottentotta pooyani sp. nov. is described and illustrated using two female specimens collected from the Khuzestan Province in Iran. This species is compared with the closely species including H. khoozestanus Navidpour, Kovařík, Soleglad & Fet, 2008; H. pellucidus Lowe, 2010 and H. saxinatans Lowe, 2010 that were previously described in Iran and Oman.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref