Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time with the available funds. The model has been tested in multi scenarios, and the results are analyzed. The results show that negative cash flow is minimized from −693,784 to −634,514 in enterprise I and from −2,646,408 to −2,529,324 in enterprise II in the first scenario and also results show that negative cash flow is minimized to −612,768 with a profit of +200,116 in enterprise I and to −2,597,290 with a profit of +1,537,632 in enterprise II in the second scenario.
In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho
... Show MoreFourier Transform-Infrared (FT-IR) spectroscopy was used to analyze gasoline engine oil (SAE 5W20) samples that were exposed to seven different oxidation times (0 h, 24 h, 48 h, 72 h, 96 h, 120 h, and 144 h) to determine the best wavenumbers and wavenumber ranges for the discrimination of the oxidation times. The thermal oxidation process generated oil samples with varying total base number (TBN) levels. Each wavenumber (400–3900 cm−1) and wavenumber ranges identified from the literature and this study were statistically analyzed to determine which wavenumbers and wavenumber ranges could discriminate among all oxidation times. Linear regression was used with the best wavenumbers and wavenumber ranges to predict oxidation time.
... Show MorePhenytoin selective electrodes were constructed based on penytoin-phosphotungstate (Ph-PT) complex with different plasticizers; di-butyl phosphate (DBP), tri-butyl phosphate (TBP), di-butyl phthalate (DBPH),and o-nitro phenyl octyl ether (NPOE) phthalate. The electrodes based on DBPH, ONPOE plasticizers gave Narnistain slope which are, 56.4 and 55.3mV/decade with detection limit of 1.9x10-5 M , 1.8x10-5 and concentration range 10-1 to 10-4 M and pH range 3.0 – 8.0. The electrodes based on TBP and DBP showed non-Nernistain slopes, 40.2,40.5 mV/decade for both plasticizers. Interfering of some cations was investigated and shows no interfering with electrodes response. Potentiometric methods were used for measuring phenytion in
... Show MorePhilosophy of Abstraction and Construction of Space in Contemporary Iraqi Theater Abstract The aesthetic and stylistic features in the theatrical play develop according to the changes of the age and its developments. Stylistic forms different from the prevailing and familiar in the visions of contemporary theatre directors emerged which adopt the removal of traditional awareness in the creation of the visual space of theatrical discourse, through adopting contemporary formats and structures which depend on the abstraction representations in the aesthetic construction of the contemporary theatre show which is one of the prerequisites of the postmodern theater, that produces aesthetic data based on abstract metaphors in the formation of th
... Show MoreSafety programmes are considered one of the means to protect workers from different accidents and injuries and also to protect all assets including machines equipment and various materials. In spite of world state interests in occupational safety, this subject didn't get the required attention by senior staff of management at most of our country construction factories and the application of safety programmes still limited and in active. In order to a achieve the goal of the study, scientific method has been pursued to obtain the necessary information related to this study through tours to related companies and their construction factories and review literature that deal with occupational safety subject and their programmes and cost, in a
... Show MoreCytokines are signaling molecules between inflammatory cells that play a significant role in the pathogenesis of a disease. Among these cytokines are interleukins (ILs) 17A and 33, and accordingly, the current case-control study sought to investigate the role of each of the two cytokines in the risk of developing multiple sclerosis (MS). Sixty-eight relapsing-remitting MS (RRMS) Iraqi patients and twenty healthy individuals (control group) were enrolled. Enzyme linked immunosorbent assay (ELISA) kits were used to determine serum levels of IL-17A and IL-33. Results revealed that IL-17A and IL-33 levels were significantly higher in MS patients than in controls (14.1 ± 4.5 vs. 7.5 ± 3.8 pg/mL; p < 0.001 and 65.3 ± 16
... Show MoreThe provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreThe provision of openings in serviceable reinforced concrete beams may result in a substantial decline in the beam's capacity and integrity, indicating the necessity of opening strengthening. The present study investigates the experimental response of reinforced concrete T-beams with multiple web-strengthened openings disposed in shear span to static and impact loads. Fourteen RC T-beams were tested in two groups, each of seven beams. The first group was tested under static loading up to failure, while the second group was tested under repeated impact loading until the width of shear cracks reached 0.3 mm. The residual static strengths of the beams subjected to impact loading were then determined. The test variables considered were
... Show MoreBackground: Assessment is an important part of the learning cascade in education. Students realize it as an influential motivator to direct and guide their learning. The method of assessment determines the way the students reach high levels of learning. It has been documented that one of factor affecting students’ choice of learning approach is the way how assessment is being performed. Many methods of assessment namely multiple choice questions, essay questions and others are mainly used to assess basic science knowledge in undergraduate education. Objectives: The aim of this study is to compare multiple choice questions (MCQ) and essay questions (EQ) (record the success and failure rate of multiple choice questions (MCQ) and essay quest
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show More