Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data is needed about the weather. Therefore, we need an algorithm that can predict the dryness factor. So, the most significant fire potential can be predicted during the dry season. Moreover, daily prediction of the dry season is needed each day to conduct the best action then a qualified preventive measure can be carried out. The method used in this study is the backpropagation algorithm which has functions for calculating, testing and training the drought factors. By using empirical data, some data are trained and then tested until it can be concluded that 100% of the data already well recognized. Furthermore, some other data tested without training, then the result is 60% of the data match. In general, this algorithm shows promising results and can be applied more to complete several variables supporters.
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show Morethis paper consists of three sections, Section one deals with the most important difficulties and characteristics of English subordinate clauses whereas section two tackles the difficulties faced by the Iraqi EFL students at the third year in the Department of English, College of languages, University of Baghdad in recognizing and producing the subordinate clauses submitting them to a test consisting of two questions (recognition and production). Finally, some pedagogical recommendation of the findings can be found in section four.
Coronary artery disease (CAD) is a major health concern and leading of death in individuals with type 2 diabetes mellitus (T2DM). Glutathione S – Transferase(GST) are known for their broad range of detoxification and in the metabolism of xenobiotics . The role of functional variants of these genes in the development of various disorder is proven. We investigated the possible role of these variants in the development of CAD in T2DM patients. In this case – control study a total of 60 patients (T2DM = 30 ; T2DM – CAD = 30) and 30 controls were included. Serum lipid profiles were measured and DNA was extracted from the blood samples. Multiplex PCR for GSTT1/M1 (present / null) polymorphism, were performed for genotyping of study pa
... Show MoreBackground: The need of the patient for a more reasonable esthetic orthodontic intervention has risen nowadays. Thus, orthodontists make use of esthetic orthodontic materials like brackets, ligature elastics, and arch wires. The esthetic brackets come as different forms of materials, such as ceramic brackets, which have their stainability remaining as the most important consideration for the patients and the orthodontists. This study aimed to compare the staining effects of various staining materials, including black tea, cigarette smoke and Pepsi, as well as the time effect on the color stability of sapphire ceramic brackets bonded with three kinds of light cure orthodontic adhesives: Transbond, Resilience and Enlight. Materials and Met
... Show MoreBackground: The objective of this in vitro study was to evaluate the vertical marginal fit of crowns fabricated with ZrO2 CAD/CAM, before and after porcelain firing cycles and after glaze cycles. Materials and Methods: An acrylic resin model of a left maxillary first molar was prepared and duplicated to have Nickel-Chromium master die. Ten die stone dies were sent to the CAD/CAM (Amann Girrbach) for crowns fabrication. Marginal gaps along vertical planes were measured at four indentations at the (mid mesial, mid distal, mid buccal, mid palatal) before (Time 0) and after porcelain firing cycles (Time 1) and after glaze cycles (Time 2) using a light microscope at a magnification of ×100. One way ANOVA LSD tests were performed to determine wh
... Show MoreThe examination of gills of the common carp Cyprinus carpio revealed the presence of two species of the family Trichodinidae belonging to the genus Dipartiella (Raabe, 1959) Stein, 1961 namely D. indiana Saha and Bandyopadhyay, 2017 and D. kazubski Mitra and Bandyopadhyay, 2009 for the first time in Iraq from Al-Graiat location on the Tigris River at Baghdad city. This also represents the first record of the genus Dipartiella from fishes of Iraq. The descriptions and measurements of these two parasite species as well as their illustrations were given.
The expansion of the social media environment has created its own linguistic realities which involve more colloquial communication and practical employment of language. This research focuses on nominalizations in detail, which are originally formed words that have been changed for a noun role. These nominalizations are examined within the context of Facebook posts. The research aims to discover the various nominalizations used and how often they appear in a large sample of data from Public Facebook Posts Corpora. Computational linguistics opened new fields of study and enabled researchers to study large amounts of data easily, making it easier to identify patterns. Two computational methods of identifying nominalization in a large dataset w
... Show More