Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data is needed about the weather. Therefore, we need an algorithm that can predict the dryness factor. So, the most significant fire potential can be predicted during the dry season. Moreover, daily prediction of the dry season is needed each day to conduct the best action then a qualified preventive measure can be carried out. The method used in this study is the backpropagation algorithm which has functions for calculating, testing and training the drought factors. By using empirical data, some data are trained and then tested until it can be concluded that 100% of the data already well recognized. Furthermore, some other data tested without training, then the result is 60% of the data match. In general, this algorithm shows promising results and can be applied more to complete several variables supporters.
Recycling process presents a sustainable pavement by using the old materials that could be milled, mixed with virgin materials and recycling agents to produce recycled mixtures. The objective of this study is to evaluate the impact of water on recycled asphalt concrete mixtures, and the effect of the inclusion of old materials into recycled mixtures on the resistance of water damage. A total of 54 Marshall Specimens and 54 compressive strength specimens of (virgin, recycled, and aged asphalt concrete mixtures) had been prepared, and subjected to Tensile Strength Ratio test, and Index of Retained Strength test. Four types of recycling agents (used oil, oil + crumb rubber, soft grade asphalt cement, and asphalt cement + Su
... Show Moreمشكلة البحث The Problem of the Research
يعّد التحصيل الدراسي للطلبة عموما من أهم أركان النشاط العقلي في المجال التربوي، فلا تكاد تخلو منه أيه مدرسة، أبتداءً من المدارس الابتدائية وقد تسبقها رياض الأطفال، إلى المدرسة الإعدادية والجامعية ، وقد تمتد إلى مراحل متقدمة في العمر، فكان الطالب وما يزال هو محور العملية ال
... Show MoreThe purpose of this research is to demonstrate the impact of deposit insurance to reduce banking risks, as banks in various countries of the world face a variety of risks that led to banking and financial crises that led to the failure and bankruptcy of many of its bank, which led to the banks to find quick and appropriate solutions to get rid of these difficulties These solutions include the use of bank deposit protection system for the many risks and sequences of crises that accompanied the Iraqi banking work of thefts, forgery, embezzlement and changing and unstable circumstances. The importance of studying the subject of research through the theoretical framework of banking risks as well as the framework of consideration In order to
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreEnsuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show More 
        