Estimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The selection includes Kut–Suwera, Kut–ShekhSaad, and Kut–Hay multilane divided highways located in the south of Iraq. The preliminary presentation of the studied highways was performed using Geographic Information System (GIS) software. Data collection was done to obtain crash numbers and types over five years with their locations, hourly traffic flow, and average spot speed and define roadway segments lengths of crash locations. The cumulative speed distribution curves introduce that the spot speed spectrum for each highway's whole traffic extends over a relatively wide range, indicating a maximum speed of 180 kph and a minimum speed of 30 kph. Multiple linear regression analysis is applied to the data using SPSS software to attain the relationships between the dependent variables and the independent variables to identify elements strongly correlated with crash densities. Four regression models are developed which verify good and strong statistical relationships between crash densities with the studied factors. The results show that traffic volume and driving speed have a significant impact on the crash densities. It means that there is a positive correlation between the single factors and crash occurrence. The higher volumes and the faster the driving speed, the more likely it is to crash. As the hourly traffic flow of automobile grows, the need for safe traffic facilities also extended. Doi: 10.28991/cej-2021-03091719 Full Text: PDF
We dealt with the nature of the points under the influence of periodic function chaotic functions associated functions chaotic and sufficient conditions to be a very chaotic functions Palace
In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
Ring theory is one of the influential branches of abstract algebra. In this field, many algebraic problems have been considered by mathematical researchers who are working in this field. However, some new concepts have been created and developed to present some algebraic structures with their properties. Rings with derivations have been studied fifty years ago, especially the relationships between the derivations and the structure of a ring. By using the notatin of derivation, many results have been obtained in the literature with different types of derivations. In this paper, the concept of the derivation theory of a ring has been considered. This study presented the definition of
Ring theory is one of the influ
... Show MoreWatermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreThis paper is mainly concerned with the study of the moral aspects that prompts William Shakespeare to attempt a romance in which he has embedded the epitome of his thought, experience, and philosophy concerning certain significant aspects of human life whose absence or negligence may threaten human existence, peace, and stability. From the beginning of history man realizes the importance of prosperity on the many and various levels that touch and address his needs and desires—natural, material, and spiritual. The Tempest, due to the dramatist's awareness of the aforementioned values, reflects the dramatist's duty as to projecting and unfolding these important aspects, reconciliation and forgiveness, that promote prosperity which is th
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
In this paper, we study the effect of group homomorphism on the chain of level subgroups of fuzzy groups. We prove a necessary and sufficient conditions under which the chains of level subgroups of homomorphic images of an a arbitrary fuzzy group can be obtained from that of the fuzzy groups . Also, we find the chains of level subgroups of homomorphic images and pre-images of arbitrary fuzzy groups
In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise closure topological spaces, fibrewise wake topological spaces, fibrewise strong topological spaces over B. Also, we introduce the concepts of fibrewise w-closed (resp., w-coclosed, w-biclosed) and w-open (resp., w-coopen, w-biopen) topological spaces over B; Furthermore we state and prove several Propositions concerning with these concepts.
The study of properties of space of entire functions of several complex variables was initiated by Kamthan [4] using the topological properties of the space. We have introduced in this paper the sub-space of space of entire functions of several complex variables which is studied by Kamthan.