Emergency vehicle (EV) services save lives around the world. The necessary fast response of EVs requires minimising travel time. Preempting traffic signals can enable EVs to reach the desired location quickly. Most of the current research tries to decrease EV delays but neglects the resulting negative impacts of the preemption on other vehicles in the side roads. This paper proposes a dynamic preemption algorithm to control the traffic signal by adjusting some cycles to balance between the two critical goals: minimal delay for EVs with no stop, and a small additional delay to the vehicles on the side roads. This method is applicable to preempt traffic lights for EVs through an Intelligent Transportation System. A Matlab-Vissim Interface was implemented to simulate the intersection and apply the proposed algorithm. The results show a significant decrease in delays for both EVs and other traffic.
In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t
... Show MoreIncreased the need to promote the profession of auditing, and improving the performance of the audit process, which comes through the effective implementation of its tasks, where the auditor collects the necessary data about the nature of client activity, and any other information it deems necessary to carry out the planning and development of the strategy for how to determine the procedures for implementing the audit process and the scope and timing for evidence clues in order to form an opinion technician neutral about the fairness of the financial statements, as required by the standards of the field work of the planning and supervision of the internal control and evidence to prove, but the failure of the auditor whether in th
... Show MoreThis study focused on benthic algae (epipelic and attached algae on concrete lining stream) in Bani-Hassan stream in Holly Karbala, Iraq. The qualitative and quantitative studies of benthic algae were done by collecting 240 samples from five sites in the study area for the period from December 2012 to November 2013. Also, the environmental variables of the stream were examined in term of temporary and spatial. The results showed that the stream was alkaline, hard, oligohaline and a well aerated. The total nitrogen to the total phosphorus (TN: TP) ratio indicates nitrogen limitation. 129 species of benthic algae belonging to 57 genera were identified. Bacillariophyceae (diatoms) was the predominant taxon (95 species) followed by Chlorophyce
... Show MoreThe steady state laminar mixed convection and radiation through inclined rectangular duct with an interior circular tube is investigated numerically for a thermally and hydrodynamicaly fully developed flow. The two heat transfer mechanisms of convection and radiation are treated independently and simultaneously. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function and the Body Fitted Coordinates (B.F.C) methods. The finite difference approach with the Line Successive Over-Relaxation (LSOR) method is used to obtain all the computational results. The (B.F.C) method is used to generate the grid of the problem. A computer program (Fortran
... Show Morehe current research aims to analyze the relationship and the level of influence of labor relations in reducing the cases of job withdrawal in private colleges in Baghdad. (265) individuals from department heads, university professors, and teaching staff in (7) private colleges located in the capital, Baghdad, and based on the Stephen Thompson equation for small samples, the sample size was determined by (157) teachers, and the questionnaire was adopted as a main tool for collecting data and information After ensuring the validity and reliability of its contents, and to test the relationship of influence, correlation and interaction between the research variables, two main hypotheses were formulated from which (5) sub-hypotheses eman
... Show MoreThe study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership pos
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreMany diseases can produce cardiac overload, of these disease hypertension, valve disease congenital anomaly in addition to many other disease. One of the most common diseases causing left ventricle overload is hypertension. A long term hypertension can cause myocardium hypertrophy leading to changes in the cardiac contractility and reduced efficiency. The investigations were carried out using conventional echocardiography techniques in addition to the tissue Doppler imaging (TDI) from which many noninvasive measurements can be readily obtained. The study has involved the effect of hypertension on the myocardium stiffness index through the measurement of early diastolic filling (E) and the early velocity of lateral mitral annulus (E
... Show More