This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hailing. According to the final model, the attitude of the commuters towards the speed of ride-hailing over hailing regular taxis was the most important and presented in all probability conditions. Several related studies also identified ride-hailing speed as one of the top reasons for using this travel option. The findings of this study imply that commuters still compare the ride-hailing services with the traditional taxis in Kuala Lumpur, especially in terms of complementarity to other modes, ease of payment, ease of access, and speed. It is critical to have a sustainable strategy for keeping commuters’ satisfaction at the highest level because if the ride-hailing services cannot meet the commuters’ expectations, they may switch back to conventional transport options.
This research aims to explain the effect of the imported inflation (which moves through the raise of global prices to Iraqi economy) over local prices, besides, the recognition the most important channels of imported inflation moving, its causes, effects, ways and policies that reduce the negative effects. To achieve the research aim, the deductive approach was adopted through using descriptive method to describe and determine phenomenon. The most important conclusion is that the research found out that there are two channels to transmission imported inflation in world. The first channel is the direct channel (prices) and the second channel is the indirect (income). The most important recommendation is to create sovereign fund (O
... Show MoreLoud noise can be extremely harmful to the auditory system as well as to human health. Noise pollution is primarily caused by traffic noise. The study's goal was to determine how various vehicle types and speeds affected the amount of noise generated by traffic. The two factors were investigated at seven different arterial streets throughout Kirkuk city to measure the noise levels. The measurements were performed during peak hours to compare the result with WHO standards for noise specification. Traffic volume and vehicle speed are shown to be the key elements that determine an increase in noise level.
A Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine (Arg) and glycine ( Gly) in arginine acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho
... Show MoreMost of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B
... Show MoreThis paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreThe increasing demand for energy has encouraged the development of renewable resources and environmentally benign fuel such as biodiesel. In this study, ethyl fatty esters (EFEs), a major component of biodiesel fuel, were synthesized from soybean oil using sodium ethoxide as a catalyst. By-products were glycerol and difatty acyl urea (DFAU), which has biological characteristics, as antibiotics and antifungal medications. Both EFEs and DFAU have been characterized using Fourier transform infrared (FTIR) spectroscopy, and 1H nuclear magnetic resonance (NMR) technique. The optimum conditions were studied as a function of reaction time, reactant molar ratios, catalyst percentage and the effect of organic solvents. The conversion ratio of soybea
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreIn this study, stabilization of expansive soils using waste materials namely; Cement Kiln Dust (CKD), and waste plastic bottles (WPB) was experimentally investigated. Using CKD and WPB are exponentially increasing day by day, due to their capability to solve both environmental and geotechnical problems successfully. Expansive soils were collected from locations with a wide range of plasticity index (PI) (15 - 27) and liquid limit (LL) (35% - 64%). Stabilizer percentages were varied from 0% to 20%, and curing durations for CKD cases were 7 and 28 days. Results showed the best percentages of CKD and WPB are 12% of each one respectively. LL, plastic limit (PL), and swelling percent (SP) loss were observed, which are 46%, 55%, and 96% respec
... Show More