Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data is needed about the weather. Therefore, we need an algorithm that can predict the dryness factor. So, the most significant fire potential can be predicted during the dry season. Moreover, daily prediction of the dry season is needed each day to conduct the best action then a qualified preventive measure can be carried out. The method used in this study is the backpropagation algorithm which has functions for calculating, testing and training the drought factors. By using empirical data, some data are trained and then tested until it can be concluded that 100% of the data already well recognized. Furthermore, some other data tested without training, then the result is 60% of the data match. In general, this algorithm shows promising results and can be applied more to complete several variables supporters.
A field study investigated the degree of need for managers working in the directories of education to develop their skills for the exercise of administrative empowerment, and it adopted the descriptive analytical approach. The research community, was determined which consisted of 126 principals, and the sample was selected with arte of randomly Statistics and by (100%) of the research community, as the number of respondents was (126) of managers working in the directories of education. A questionnaire was built which included 40 items distributed among the fields of study. Researchers verified its validity and reliability. The research data were analyzed using software (SPSS), the questionnaire was applied in the second semester of the a
... Show MoreResumen
El presente trabajo nace de una inquietud por la enseñanza del español en Irak a nivel universitario especialmente ante las dificultades que los alumnos árabes en general, e iraquíes en particular, encuentran en su proceso de aprendizaje. Nuestra primera inclinación fue, pues, prestar una atención directa y cercana al alumno como sujeto del aprendizaje, así como a lo que el alumno produce como resultado del mismo. En el presente trabajo pretendemos dotar al estudiante de los conocimientos lingüísticos necesarios para poder interaccionar en una variedad de situaciones y enfrentarse a problemas cotidianos, de manera que desarrolle las destrezas comunicativas que le permitan establecer una co
... Show MoreThis research deals with one scene from the movie Romeo and Juliet, which is the balcony scene, due to the importance of this scene in the formation of the construction of the subsequent events of the movie.
The first chapter contained the methodological framework of the research, where the research problem was identified in how Zeffirelli dealt with the balcony scene in the play Romeo and Juliet and enriched it in the cinematic language with a comparison with the original text of the scene. In the balcony scene with comparative parts between the film and the text and the limits of the research that was limited to the film Zeffirelli and the translated text by Munis Taha Hussein.
The second chapter contained the theoretic
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreIn this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed
... Show MoreThis paper describes the use of remote sensing techniques in verification of the polluted area in Diyala River and Tigris River and the effected of AL-Rustamiyah wastewater treatment plant, which is located on Diyala River, one of the branches of Tigris River in south of Baghdad. SPOT-5 a French satellite image of Baghdad, Iraq was used with ground resolution of 2.5 m in May 2016. ENVI 5.1 software programming was utilized for Image processing to assess the water pollution of Diyala and Tigris River’s water. Five regions were selected from a study area and then classified using the unsupervised ISODATA method. The results indicated that four classes of water quality which are successful in assessing and mapping water pollution which confi
... Show MoreThis study aims mainly to identify the role of the use of blockchain technology in improving the quality of digital financial reports, answering questions and testing the hypothesis of the study, the researchers relied on the descriptive analytical approach, and to obtain the necessary data a questionnaire was distributed after evaluation to the study community.
The results of the study have shown that the use of blockchain technology helps to provide a high degree of reliability in digital financial reports published to banks over the Internet, ensure the speed of completion and completion, and maintain the privacy and confidentiality of the information contained in the digital financial reports of banks
... Show MoreBackground: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show More