The interesting new sources of data for official statistics are cell phone data. Electronic media has defined the way of research human behavior rapidly over the last decade. As data storage and sensing technology progressed, electronic records now cover a diverse variety of human activities from localized data (phone) to open source contributions on Wikipedia and the Open Area Map. Electronic records now encompass the numerous fields of activity. The ad hoc vehicle network is a research community-based wireless technology for the implementation of intelligent transport applications. It is necessary to estimate migration flows and predict future trends to understand the causes and effects of migration and to enforce policies to deliver certain services. Several studies have exposed in this review with their datasets such as Credit card records (CCRs) provide deep insight into buying behavior; Call Details Records (CDRs) present new possibilities for under-implemented human mobility. Therefore, various forms of transportation and other travel behavior, various travel-related events such as "Home-Tour-Work -Tour-Tour” and the corresponding travel-related motifs have also been distinguished by the inclusion of land use details in the GIS data. This review also investigated migration trips residence between cities and inside a single city. The review concluded clear results for the adoption of the mentioned data, for example, mobile phone data (CDRs), because it is very useful as it provides real big data or real time big data without additional cost and is available in telecommunications companies, from which it is possible to analyze the movement of communities and deduce the activity of a particular city. In the future, there is a tendency to use this type of data from Korek Telecom Company in Iraq to the flow migration of Iraq governorates by using the gravity model. As well as, an attempt to study the conditions of cities and the movement of individuals in urban places to clarify the needs of the city in its need for new improvements.
The prediction of the blood flow through an axisymmetric arterial stenosis is one of the most important aspects to be considered during the Atherosclrosis. Since the blood is specified as a non-Newtonian flow, therefore the effect of fluid types and effect of rheological properties of non-Newtonian fluid on the degree of stenosis have been studied. The motion equations are written in vorticity-stream function formulation and solved numerically. A comparison is made between a Newtonian and non-Newtonian fluid for blood flow at different velocities, viscosity and Reynolds number were solved also. It is found that the properties of blood must be at a certain range to preventing atheroscirasis
<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe
... Show MoreSensibly highlighting the hidden structures of many real-world networks has attracted growing interest and triggered a vast array of techniques on what is called nowadays community detection (CD) problem. Non-deterministic metaheuristics are proved to competitively transcending the limits of the counterpart deterministic heuristics in solving community detection problem. Despite the increasing interest, most of the existing metaheuristic based community detection (MCD) algorithms reflect one traditional language. Generally, they tend to explicitly project some features of real communities into different definitions of single or multi-objective optimization functions. The design of other operators, however, remains canonical lacking any inte
... Show MoreIn this present paper , a special model was built to govern the equations of two dimensional peristaltic transport to nanofluid flow of a heat source in a tapered considered in an asymmetric channel. The equations of dimensionless temperature concentration are analytical solve under assumption slow Reynolds number and long wave length. Furthermore, the results that receive by expressing the maximum pressure rise communicates increased in case of non-Newtonian fluid when equated with Newtonian fluid. Finally, MATHEMATICA 11 program has been used to solve such system after obtaining the initial conditions. Most of the results of drawing for many are obtained via above program .
<span lang="EN-US">In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, and industry. In this paper, the physical prototype of a proposed self-balancing platform that described the self-balancing attitude in the (X-axis, Y-axis, or biaxial) under the influence of road disturbance has been introduced. In the physical prototype, the inertial measurement unit (IMU) sensor will sense the disturbance in (X-axis, Y-axis, and biaxial). With the determined error, the corresponding electronic circuit, DC servo motors, and the Arduino software, the platform overcame the tilt angle(disturbance). Optimization of the proportional-integral-
... Show MoreAbstract This study seeks to deal academically with how the EU treats clandestine immigration, through adopting a purley security approach, based on the European understanding of security threats posed to the security of communities and States in EU at all levels. So they agreed upon criminalizing this threat within the bloc while using repressive tools and steps to limit illegal immigrants flow to European territories. Accordingly, the EU gave the phenomen a security character. So it takes it from low politics level , that of employment and economic field to that of high politics, as a new security problem lying within a new security language embraced by ruling European elites, in other words EU touched on this issue as a speech act emp
... Show More"This paper presents a study of inclined magnetic field on the unsteady rotating flow of a generalized Maxwell fluid with fractional derivative between two inclined infinite circular cylinders through a porous medium. The analytic solutions for velocity field and shear stress are derived by using the Laplace transform and finite Hankel transform in terms of the generalized G functions. The effect of the physical parameters of the problem on the velocity field is discussed and illustrated graphically.
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show More