This essay aims to highlight the most important issues and difficulties facing implementing large projects that follow the turn-key method, considered one of the types of contractual methods in Iraq, especially for large and complex projects requiring speedy completion. The projects implemented in this way face delays and delays in completion, which led to the lack of benefit from the projects for which they were implemented, especially those affecting the lives of citizens within the health sector. The case study dealt with the construction of hospitals with multi-bed capacities within multiple governorates in Iraq, With large financial allocations within the federal budget of the Government of Iraq over several years. After conducting a descriptive statistical analysis of the data obtained through a field survey and interviews with individuals working in the construction sector with experience in their field. The most important 10 factors were identified from a list of 51 delay factors (distributed according to the questionnaire forms) with a high RII. These factors were related to the delay in the payment of the contractor's dues, the delay in processing materials, the issuance of new instructions and regulations, the delay in obtaining official approvals from the relevant authorities, Errors in designs or contracting documents, lack of cooperation between the contracting parties, and multiple spare orders for reasons belonging to the employer. The article also included the most important suggestions that contribute to reducing the delay in completing projects.
The execution phase of the project is most dangerous and the most drain on the resources during project life cycle, therefore, its need to monitor and control by specialists to exceeded obstructions and achieve the project goals. The study aims to detect the actual reasons behind mismanagement of the execution phase. The study begins with theoretical part, where it deals with the concepts of project, project selection, project management, and project processes. Field part consists of three techniques: 1- brainstorming, 2- open interviews with experts and 3- designed questionnaire (with 49 reason. These reasons result from brainstorming and interviewing with experts.), in order to find the real reasons behind misman
... Show MoreIn this paper, we consider the problem of stochastic project network when some or all activities are interrupted. An approach has been built to schedule the critical activities, by constructing some expressions based on the project lateness costs due to the interruption activities. Two simple example are presented to validate our approach.
Key words: Project Management, Project scheduling, Stochastic activity duration, Stochastic PERT.
Introduction
Recently, Projects planning and optimal timing, under uncertainty are extremely critical for many organizations, see [19]. Having an effective mathematical model wi
... Show MoreThis study aims to answer a significant problem of social sciences and philosophy: How do we construct an institutional reality such as diplomacy with an objective recognizable existence? The study assumes that the ability to build institutional reality is based on our biological capacity, as it takes different forms in all the institutions we construct. The study takes the theory of the American philosopher John Searle as an approach to examining the assumption. The study sums up important findings; cultures, although they share the biological capacity on which they produce institutional realities, differ in the form of the value standards on which the institutional realities are based. The study recommends the need of Arab social resea
... Show MoreThis paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.
We present a reliable algorithm for solving, homogeneous or inhomogeneous, nonlinear ordinary delay differential equations with initial conditions. The form of the solution is calculated as a series with easily computable components. Four examples are considered for the numerical illustrations of this method. The results reveal that the semi analytic iterative method (SAIM) is very effective, simple and very close to the exact solution demonstrate reliability and efficiency of this method for such problems.
In developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the
... Show More