Transit agencies constantly need information about system operations and passengers to support their regular scheduling and operation planning processes. The lack of these processes and cultural motivations to use public transportations contributes enormously to the reliance on the private cars rather than public transportation, resulting in traffic congestions. The traffic congestions occur mainly during peak hours and the accidents happening as a result of road accidents and construction works. This study investigates the effects of weekday and weekend travel variability on peak hours of the passenger flow distribution on bus lines, which can effectively reflect the degree of traffic congestion. A study of passenger traffic flow patterns during these times can impact planning decisions on transportation engineers. It can be viewed as a building block for generating a reliable schedule for a given bus route within the context of an optimization process. Collecting data sets of a two-directional bus line in Sulaimani city, connecting a residential district to the city center, for three days (Wednesday, Thursday, and Friday), and this study analyzed the flow and distribution of weekday and weekend passenger movements along with the bus stops of each direction on-peak and off-peak periods. The results indicate that Thursday passenger volume is more similar to Friday passenger volume than on Wednesday passenger volume. The passenger volume of direction D1 (from the residential district to the city center) is double that of direction D2 (from the city center to the residential district). The maximum morning peak time is on Wednesday with 442 passengers/hr, starting from 7:30 to 9:00, and the maximum evening peak hour is on Thursday with 420 passengers/hr, beginning from 14:30 to 16:30.
Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreRegression analysis models are adopted by using SPSS program to predict the 28-day compressive strength as dependent variable and the accelerated compressive strength as independent variable. Three accelerated curing method was adopted, warm water (35ºC) and autogenous according to ASTM C C684-99 and the British method (55ºC) according to BS1881: Part 112:1983. The experimental concrete mix design was according to ACI 211.1. Twenty eight concrete mixes with slump rang (25-50) mm and (75-100)mm for rounded and crushed coarse aggregate with cement content (585, 512, 455, 410, 372 and 341)Kg/m3.
The experimental results showed that the acc
... Show MoreBackground: Lead (pb )is suspected to be one of the endocrine disruptors. People are exposed to high levelsof it in the environment through several ways .In the last years there was an evidence that it affects semenquality. The aim of the study is to assess the level of lead in the blood of male patients and correlate it with theseminal fluid parameters and hormonal levels.Methods: Fifty three infertile male patients, attending the infertility clinic in Baghdad Teaching Hospital fromFebruary 2016 till June 2016, participated in this study. Detailed history was taken and careful examinationwas done. Semen was collected from the patients and analyzed. Blood was withdrawn for hormonal and leadanalysis.Results: There was an increase in blood le
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b
... Show MoreThe current work concerns preparing cobalt manganese ferrite (Co0.2Mn0.8Fe2O4) and decorating it with polyaniline (PAni) for supercapacitor applications. The X-ray diffraction findings (XRD) manifested a broad peak of PAni and a cubic structure of cobalt manganese ferrite with crystal sizes between 21 nm. The pictures were taken with a field emission scanning electron microscope (FE-SEM), which evidenced that the PAni has nanofibers (NFs) structures, grain size 33 – 55 nm, according to the method of preparation, where the hydrothermal method was used. The magnetic measurements (VSM) that were conducted at room temperature showed that the samples had definite magnetic properties. Additionally, it was noted that the saturation magnetizatio
... Show MoreOne of the wellbore instability problems in vertical wells are breakouts in Zubair oilfield. Breakouts, if exceeds its critical limits will produce problems such as loss circulation which will add to the non-productive time (NPT) thus increasing loss in costs and in total revenues. In this paper, three of the available rock failure criteria (Mohr-Coulomb, Mogi-Coulomb and Modified-Lade) are used to study and predict the occurrence of the breakouts. It is found that there is an increase over the allowable breakout limit in breakout width in Tanuma shaly formation and it was predicted using Mohr-Coulomb criterion. An increase in the pore pressure was predicted in Tanuma shaly formation, thus; a new mud weight and casing pr
... Show MoreMethods of speech recognition have been the subject of several studies over the past decade. Speech recognition has been one of the most exciting areas of the signal processing. Mixed transform is a useful tool for speech signal processing; it is developed for its abilities of improvement in feature extraction. Speech recognition includes three important stages, preprocessing, feature extraction, and classification. Recognition accuracy is so affected by the features extraction stage; therefore different models of mixed transform for feature extraction were proposed. The properties of the recorded isolated word will be 1-D, which achieve the conversion of each 1-D word into a 2-D form. The second step of the word recognizer requires, the
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More