Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data is needed about the weather. Therefore, we need an algorithm that can predict the dryness factor. So, the most significant fire potential can be predicted during the dry season. Moreover, daily prediction of the dry season is needed each day to conduct the best action then a qualified preventive measure can be carried out. The method used in this study is the backpropagation algorithm which has functions for calculating, testing and training the drought factors. By using empirical data, some data are trained and then tested until it can be concluded that 100% of the data already well recognized. Furthermore, some other data tested without training, then the result is 60% of the data match. In general, this algorithm shows promising results and can be applied more to complete several variables supporters.
This study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap
... Show MoreThe gas chromatography (GC) method in analytical chemistry is a quick and accurate method to detect volatile components like ethanol. A method for determining volatile components known as Headspace chromatography (HS-GC) was developed along with an internal standard method (ISM) to identify ethanol in fermented broth in the laboratory. The aim of this research is determining the concentration of ethanol in fermented broth using capillary column (ZB-1). This method can analyze ethanol concentrations in the fermented medium broth ranging from 10 to 200 g/L. The validation of this method was done in order to obtain the results to be of high precision and the significant, precision was represented as the relative standard deviation (RSD) which
... Show MoreThe large number of failure in electrical power plant leads to the sudden stopping of work. In some cases, the necessary reserve materials are not available for maintenance which leads to interrupt of power generation in the electrical power plant unit. The present study, deals with the determination of availability aspects of generator in unit 5 of Al-Dourra electric power plant. In order to evaluate this generator's availability performance, a wide range of studies have been conducted to gather accurate information at the level of detail considered suitable to achieve the availability analysis aim. The Weibull Distribution is used to perform the reliability analysis via Minitab 17, and Artificial Neural Networks (ANNs) by approaching o
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThis research adopts the estimation of mass transfer coefficient in batch packed bed distillation column as function of physical properties, liquid to vapour molar rates ratio (L / V), relative volatility (α), ratio of vapour and liquid diffusivities (DV / DL), ratio of vapour and liquid densities (ρV / ρL), ratio of vapour and liquid viscosities (μV/ μL).
The experiments are done using binary systems, (Ethanol Water), (Methanol Water), (Methanol Ethanol), (Benzene Hexane), (Benzene Toluene). Statistical program (multiple regression analysis) is used for estimating the overall mass transfer coefficient of vapour and liquid phases (KOV and KOL) in a correlation which represented the data fairly well.
KOV = 3.3 * 10-10
... Show MoreCommunity detection is an important and interesting topic for better understanding and analyzing complex network structures. Detecting hidden partitions in complex networks is proven to be an NP-hard problem that may not be accurately resolved using traditional methods. So it is solved using evolutionary computation methods and modeled in the literature as an optimization problem. In recent years, many researchers have directed their research efforts toward addressing the problem of community structure detection by developing different algorithms and making use of single-objective optimization methods. In this study, we have continued that research line by improving the Particle Swarm Optimization (PSO) algorithm using a
... Show More