This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the application of the most prominent methods of plans Network (Gantt Chart, CPM, PERT), in planning and scheduling project activities and using computer programs related to network planning methods, especially (MS Project) and (Win QSB) program in determining the nature of relationships and interdependence between activities and processing data for the project to obtain results and draw Project networks The study reached a set of results, the most important of which is when applying network planning methods. This led to a reduction in the project completion time. Reliance on the CPM method and at the same cost allocated under normal conditions to (803) days, but in the case of accelerating the total project, the completion period is (643) days, and when adopting the PERT method, the total period of completion according to the project data is (796) day with a probability ratio of (0.43).
Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.
In this paper, ceramic water filters were produced by using ten mixtures of different ratios of red clay and sawdust under different production conditions. The physical properties of these filters were tested. The production conditions include five press pressures ranged from 10 to 50MPa and a firing schedule having three different final temperatures of 1000, 1070, and 1100˚C. The tests results of the physical properties were used to obtain best compatibility between the hydraulic and the mechanical properties of these filters. Results showed that as the press pressure and the firing temperature are increased, the bulk density and the compressive and bending strengths of the produced filters are increased, while, the porosity and absorp
... Show MoreA multidimensional systolic arrays realization of LMS algorithm by a method of mapping regular algorithm onto processor array, are designed. They are based on appropriately selected 1-D systolic array filter that depends on the inner product sum systolic implementation. Various arrays may be derived that exhibit a regular arrangement of the cells (processors) and local interconnection pattern, which are important for VLSI implementation. It reduces latency time and increases the throughput rate in comparison to classical 1-D systolic arrays. The 3-D multilayered array consists of 2-D layers, which are connected with each other only by edges. Such arrays for LMS-based adaptive (FIR) filter may be opposed the fundamental requirements of fa
... Show MoreBy driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root gives invertible model and when the sign is negative means the root gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when
Abstract
Objective(s): To evaluate the nurses` practices for children who diagnosed with febrile convulsion.
Methodology: A quantitative research, descriptive correlational design was used in this study, the study conducted on nurses who work in Al-Diwaniya Pediatrics Teaching Hospital-Iraq for Maternal and Children period from 12th September 2021 to 10th October 2022. A non- probability (convenience) sample has been applied to obtain the study goals. The study sample was (21) nurses who participate in the study. The study tool is composed of two parts: The first part is concerned with collection of nurses socio-demographic data obta
... Show MoreL1 adaptive controller has proven to provide fast adaptation with guaranteed transients in a large variety of systems. It is commonly used for controlling systems with uncertain time-varying unknown parameters. The effectiveness of L1 adaptive controller for position control of single axis has been examined and compared with Model Reference Adaptive Controller (MRAC). The Linear servo motor is one of the main constituting elements of the x-y table which is mostly used in automation application. It is characterized by time-varying friction and disturbance.
The tracking and steady state performances of both controllers have been assessed fo
... Show MoreIn this paper the definition of fuzzy normed space is recalled and its basic properties. Then the definition of fuzzy compact operator from fuzzy normed space into another fuzzy normed space is introduced after that the proof of an operator is fuzzy compact if and only if the image of any fuzzy bounded sequence contains a convergent subsequence is given. At this point the basic properties of the vector space FC(V,U)of all fuzzy compact linear operators are investigated such as when U is complete and the sequence ( ) of fuzzy compact operators converges to an operator T then T must be fuzzy compact. Furthermore we see that when T is a fuzzy compact operator and S is a fuzzy bounded operator then the composition TS and ST are fuzzy compact
... Show More