Transit agencies constantly need information about system operations and passengers to support their regular scheduling and operation planning processes. The lack of these processes and cultural motivations to use public transportations contributes enormously to the reliance on the private cars rather than public transportation, resulting in traffic congestions. The traffic congestions occur mainly during peak hours and the accidents happening as a result of road accidents and construction works. This study investigates the effects of weekday and weekend travel variability on peak hours of the passenger flow distribution on bus lines, which can effectively reflect the degree of traffic congestion. A study of passenger traffic flow patterns during these times can impact planning decisions on transportation engineers. It can be viewed as a building block for generating a reliable schedule for a given bus route within the context of an optimization process. Collecting data sets of a two-directional bus line in Sulaimani city, connecting a residential district to the city center, for three days (Wednesday, Thursday, and Friday), and this study analyzed the flow and distribution of weekday and weekend passenger movements along with the bus stops of each direction on-peak and off-peak periods. The results indicate that Thursday passenger volume is more similar to Friday passenger volume than on Wednesday passenger volume. The passenger volume of direction D1 (from the residential district to the city center) is double that of direction D2 (from the city center to the residential district). The maximum morning peak time is on Wednesday with 442 passengers/hr, starting from 7:30 to 9:00, and the maximum evening peak hour is on Thursday with 420 passengers/hr, beginning from 14:30 to 16:30.
Influenza is a highly infectious and lethal viral disease, it appears on Earth periodically in connection with the passage of comet in the vicinity of Earth around the Sun .it is believed that particles spread from the tail of the comet due to solar heating energy ,are contaminated with very tiny small particles considered as viruses. Viruses reach the Earth with the power of the solar wind due to solar activity cycle which is driven every 11 year. Viruses pushed towards Earth’s atmosphere, then precipitate on clouds and reach the surface of Earth. These viruses are very well shielded and unaffected by even UV radiation ,but the only way the shell is melt when they passes through the digestive system . Results showed a good correlation
... Show MoreThe present study aims to establish an empirical correlation between biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) of the sewage flowing in Al-Diwaniyah wastewater treatment plant. The strength of the wastewater entering the plant varied from medium to high. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. Regression equations for BOD5 and COD removal percentages were suggested which can be used to evaluate rapid effluent assessment after the treatment processes or optimal process control to improve the performance of wastewater treatment plants.
... Show MoreIn this paper, we consider a new approach to solve type of partial differential equation by using coupled Laplace transformation with decomposition method to find the exact solution for non–linear non–homogenous equation with initial conditions. The reliability for suggested approach illustrated by solving model equations such as second order linear and nonlinear Klein–Gordon equation. The application results show the efficiency and ability for suggested approach.
The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show MoreCalcium carbonate is predominantly present in aqueous systems, which is
commonly used in industrial processes. It has inverse solubility characteristics
resulting in the deposition of scale on heat transfer surface. This paper focuses on
developing methods for inhibition of calcium carbonate scale formation in cooling
tower and air cooler system where scaling can cause serious problems, ZnCl 2 and ZnI
2 has been investigated as scale inhibitor on AISI 316 and 304. ZnCl 2 were more
effective than ZnI 2 in both systems, and AISI 316 show more receptivity to the
chlorides salt compared to AISI 304. The inhibitors were more effective in cooling
tower than air cooler system. AISI 316 show more constant inhibition effic
Background: The discriminative power of the classical WHO parameters in relation to male fertility is quite low, because they only address few aspects of sperm quality and function. This has led investigators to focus their attention on the male gamete and in particular its genome.Objective: To explore which of the sperm DNA damage parameters measured by comet assay are more reliable, and their relations with the standard semen parameters.Methods: Study was done on 40 infertile men selected from couples attending the Institute of Embryo Reasearch and Infertility Treatment at Al-Kadhimiya City/ Baghdad in the period between February 2009 and May 2009, with a history of infertility of ≥1 years; and 15 healthy volunteers of proven fertili
... Show MoreLet R be associative ring with identity and M is a non- zero unitary left module over R. M is called M- hollow if every maximal submodule of M is small submodule of M. In this paper we study the properties of this kind of modules.
Binuclear copper, nickel, cobalt, manganese and mercury complexes of the Schiff base H2L (C40H28N2O4) obtained by condensation of 2-benzoyl benzoic acid with benzidine. The Schiff base and their complexes have been subjected to[ FT-IR, elemental analysis ,UV-Vis, 1H and 13C NMR ] spectral studies, molar conductivity, magnetic moment and HPLC measurements. All the complexes showed tetrahedral geometries with the general structure [M2(L)2]. Generality of the synthesized components offer antibacterial efficiency to (Staphylococcu saureus), (Escherichia coli),(Bacillus subtilis) and(Pseudomonas aeruginosa).
Abstract
Research title: The legal ruling of advice.
This research deals with the topic of advice, as the research included the following:
Preamble: I explained in it the meaning of advice in the Qur’an and Sunnah, and that what is meant by it is a good performance of the duty, then explaining its importance, importing it, and the difference between advice and what is similar to it, from enjoining good, denial, reproach and reprimand, backbiting and the will.
The first topic: It dealt with the ruling on advice, whether it is recommended or disliked, or forbidden, because what is meant by it is to give advice to others may be an obligation in kind, or it may be desirable or dislike
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More