this research five grammatical terminology, and predicate and ascribed to it and added and genitive, examined scientific accuracy envisaged in placed and how they conform to the content then proposed five alternative terminology, and proved that this alternative terminology reflects more accurately the content of conventional terminology in Arabic grammar lesson, logical approach relies on analysis of morphological derivation of the term and its language, and recommended research to pursue critical studies in grammatical terminology, because such research has Significant impact in removing the grammatical ambiguity of some scholars, as well as instrumental in the development of methods of teaching Arabic grammar, to return to the relationship between lexical meaning of vocabulary and semantic meaning of the term than scientific article clearer when the world and learners alike.
Abstract. In this paper, a high order extended state observer (HOESO) based a sliding mode control (SMC) is proposed for a flexible joint robot (FJR) system in the presence of time varying external disturbance. A composite controller is integrated the merits of both HOESO and SMC to enhance the tracking performance of FJR system under the time varying and fast lumped disturbance. First, the HOESO estimator is constructed based on only one measured state to precisely estimate unknown system states and lumped disturbance with its high order derivatives in the FJR system. Second, the SMC scheme is designed based on such accurate estimations to govern the nominal FJR system by well compensating the estimation errors in the states and the lumped
... Show MoreAbstract:
This research aims to apply the Performance Focused Activity Based Costing System in the consultant office of Al-Khwarizmi College of Engineering at the University of Technology for the purpose of measuring the cost of consulting services provided by these offices in order to reduce costs and their reflection in achieving profits. For the purpose of calculating costs accurately, and to test the hypothesis of the research, the research was applied in the office of the consultant of the College of Engineering Al-Khwarizm - University of Baghdad through the financial statement
... Show MoreThe present work represents a theoretical study for the correction of spherical aberration of an immersion lens of axial symmetry operating under the effect of space charge, represented by a second order function and preassigned magnification conditions in a focusing of high current ion beams. The space charge depends strongly on the value of the ionic beam current which is found to be very effective and represents an important factor effecting the value of spherical aberration .The distribution of the space charge was measured from knowing it's density .It is effect on the trajectory of the ion beam was studied. To obtain the trajectories of the charged particles which satisfy the preassined potential the axial electrostatic potential w
... Show MoreDual-species biofilms of Pseudomonas aeruginosa and Staphylococcus aureus generate difficult-to-treat illnesses. Nutrition stress in biofilms affects physiology, microbial metabolism, and species interactions, impacting bacteria growth and survival. Furthermore, the function of alginate, which is encoded by the algD gene, in the production of biofilms has been established. The present study aimed at investigating the impact of starvation on algD gene expression in single-species biofilm of P. aeruginosa and dual-species biofilms of P. aeruginosa and S. aureus from hospital sewage. A total of six P. aeruginosa and six S. aureus isolates were obtained from the microbiology laboratory at the Department of Biology, College of Science, Universit
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More