Abstract
This study was to demonstrate the role-use planning scientific methods is disabled and little used in the planning and follow-up construction of vital projects in the province of Baghdad, including network planning methods, in order to find the optimal time to finish the project in light of the resources available and the budget set for it, in the current research has been used the most prominent network planning methods and two stylistic (CPM / PERT), was the application of the critical path method on standard-design school project (traditional) to draw Action Network according to confirmed times for the activities of the project and account his Crashing time , It was Pert technique applied to the project hemato
... Show MoreAbstract:
Witness the current business environment changes rapidly reflected on the performance of the facility wishing to stay , which is no longer style reaction enough to handle installations with their environment , and quickly began to lose its luster with the emergence of a message and the vision of contemporary business environment from a set of parts interacting with each other and the concept of behavioral includes all dimensions of performance, it is imperative to adopt a system installations influence variables and positive interaction through the development of strategic plans and the use of implementation and follow-up strategies to ensure the effectiveness of the method for meas
... Show MoreToday, the success or failure of organizations depends to possess the wisdom of their managers promised that the key to organizational success of the business environment, making the right decisions, and create the ability to work and think towards discrimination of products and services the organization . Seek this research to investigation the relationship between the wisdom management and differentiation strategy for service operations . It was a test of that relationship in light of the results of the analysis of the data collected through the questionnaire distributed on a sample from (98) Director Mangers, head of department and head of division in the General Establishment of Civil Aviation . The research used descriptive st
... Show MoreAbstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show More