Preferred Language
Articles
/
joe-2556
Solving Time-Cost Tradeoff Problem with Resource Constraint Using Fuzzy Mathematical Model
...Show More Authors

Scheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy theory combining CPM computations, time-cost trade off analysis and resource constraint. MATLAB software has been adopted to perform ranking process, for each case, that
facilitates obtaining the optimum solution. This research infers that it is possible to perform time-cost trade off analysis with resource restriction simultaneously, which ensures achieving scheduling optimum solution reducing the effort and the time when performing these techniques in succession using traditional methods.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
A Hyperbolic Potential Field Model for Designing an Einzel Lens of Low Aberrations
...Show More Authors

An analytical model in the form of a hyperbolic function has been suggested for the axial potential distribution of an electrostatic einzel lens. With the aid of this hyperbolic model the relative optical parameters have been computed and investigated in detail as a function of the electrodes voltage ratio for various trajectories of an accelerated charged-particles beam. The electrodes voltage ratio covered a wide range where the lens may be operated at accelerating and decelerating modes. The results have shown that the proposed hyperbolic field has the advantages of producing low aberrations under various magnification conditions and operational modes. The electrodes profile and their three-dimensional diagram have been determined whi

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 14 2020
Journal Name
College Of Islamic Sciences
(Social Reform in the Light of Modern Islamic Thought (Malik bin Nabi model
...Show More Authors

Social reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.<

... Show More
View Publication
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
Trends of poetic purposes towards praise: Dabal al-Khuzai's poetry is a model
...Show More Authors

Poetic objects may go towards a specific purpose and dissolve and interact with them to produce
A purpose characterized by the title but belongs to the U from afar.
The yarn goes towards praise with a purely horizontal relationship that mentions virtues but crowns them towards women.
In lamentation remember the virtues but crown them towards the dead.
In wisdom remember the virtues but crown them towards time.
In the description remember the virtues but crown them towards nature. All objects are inline
Horizontal We will prove this in the axes of research has required the plan to be a blind, five
The preamble, a brief overview of the life of Dabal All Khuzaie and the works and poets of the first axis
The direction

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Shift formal regulations on Mesopotamian pottery (Pottery Samarra model): محمد جاسم محمد العبيدي
...Show More Authors

Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Style ''Affirmative say'' in the holy Quran Ibn Ashour's interpretation is a model
...Show More Authors

Abstract

This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style:  ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.

Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
US policy toward the political movement in the Arab countries Egypt a model
...Show More Authors

The whole world and the Arab world, especially an important part of this international system, is undergoing a radical transformation at all levels. This mosaic of political, economic, social and military relations and alliances, whether based on the special interests of the major Powers or on the basis of mutual interests, The major transformations to social, economic, political and military conflict and these transformations still bear more surprises, at all levels, nothing remains constant, all changed, relations changed and alliances changed and loyalties fell and the principles of the M changed and the spectacular imperial economies collapsed and the will of the masses was no longer fixed.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
"Compared some of the semi-parametric methods in analysis of single index model "
...Show More Authors

As the process of  estimate for model and variable selection significant is a crucial process in the semi-parametric modeling At the beginning of the modeling process often At there are many explanatory variables to Avoid the loss of any explanatory elements may be important as a result , the selection of significant variables become necessary , so the process of variable selection is not intended to simplifying  model complexity explanation , and also predicting. In this research was to use some of the semi-parametric methods (LASSO-MAVE , MAVE and The proposal method (Adaptive LASSO-MAVE) for variable selection and estimate semi-parametric single index model (SSIM) at the same time .

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Civil Engineering Journal
Model Development for the Prediction of the Resilient Modulus of Warm Mix Asphalt
...Show More Authors

Increasing material prices coupled with the emission of hazardous gases through the production and construction of Hot Mix Asphalt (HMA) has driven a strong movement toward the adoption of sustainable construction technology. Warm Mix Asphalt (WMA) is considered relatively a new technology, which enables the production and compaction of asphalt concrete mixtures at temperatures 15-40 °C lower than that of traditional hot mix asphalt. The Resilient modulus (Mr) which can be defined as the ratio of axial pulsating stress to the corresponding recoverable strain, is used to evaluate the relative quality of materials as well as to generate input for pavement design or pavement evaluation and analysis. Based on the aforementioned preface, it is

... Show More
View Publication
Crossref (6)
Crossref