Kurdish language multifunctional morphemes indicate the different functional morphological, syntactical, and semantic tasks of the morphemes. The present study discusses the multifunctional task of the Morpheme Le in Kurdish Language. The Morpheme Le has marginally been included in other studies, yet up to the present times, there has not been a research inclusively dedicated to thoroughly discuss and clarify its multifunctional aspects. The present study is divided into two chapters: Chapter one discusses the theoretical aspect of chapter two that is entirely concerned with the practical aspect of the morpheme Le. The first part of chapter one sheds light on the morphological aspect of the morpheme while part two discusses the concept of multifunction in Kurdish language including its concepts, types and characteristics. Chapter two is concerned with the practical aspect of the morpheme. Part one of chapter two describes the morphemes’ morphological aspect and part two explains its syntactical aspects. The conclusion sums up the study most important findings and the number of the academic references referred. پوختەی توێژینەوەکە: توێژینەوەکە لەژێر ناونیشانی (فرەئەرکی مۆرفیمەکان لە زمانی کوردیدا، مۆرفیمی (لە) بەنموونە)یە. ئەو ئەرکانە دەخاتەڕوو کە مۆرفیمی (لە) دەیگێڕێت. ئەم کارە بۆ چەمکی فرەئەرکی لە زمانی کوردیدا تەرخانکراوە، یەکێک لە مۆرفیمە پڕئەرکەکان دەخاتەبەرباس، کە ئەویش مۆرفیمەکانی (لە)یە. مۆرفیمی (لە) لە سەرچاوەی جیاوازدا کەم و زۆر باسکراوە، بەڵام توێژینەوەیەکی تایبەتی سەربەخۆی لەسەر نەنووسراوە، نووسرابێتیش بە قووڵی نەچوونەتە بنج و بناوانی و بە تێروتەسەلی لێیان نەکۆڵیوەتەوە. لە هەندێ کاری زانستیدا باسکراوه، بەڵام کارەکە تەنها بۆ ئەو مۆرفیمە تەرخاننەکراوە، بەڵکو لە میانەی ئەو کارەدا، مۆرفیمی (لە)ش هاتۆتە بەرباسکردن. لەم توێژینەوەیەدا هەوڵدراوە، تا بکرێت باس لە هەموو لایەنەکانی مۆرفیمی (لە) بکرێت لە ڕووی وشەسازی و ڕستەسازی و تەنانەت لەڕووی واتاشەوە و ئەرکە جیاجیاکانی دیاریبکرێت. مۆرفیمی (لە) یەکێکە لە مۆرفیمە چالاکەکانی زمانی کوردی و لە زۆربەی ئاستەکانی زماندا ئەرکی پێسپێردراوە. گرنگیی ئەم توێژینەوە لەوەدایە، بە پوختی و تێروتەسەلی تیشک دەخاتەسەر ئەرکە جیاجیاکانی مۆرفیمی (لە) لەڕووی وشەسازی و ڕستەسازی ...ەوە،هتد. سنووری توێژینەوەکەش لە هەردوو ئاستی وشەسازی و ڕستەسازیدا ئەنجامدراوە، جارجاریش پەنجە بۆ لایەنی واتاییش بردراوە. لەم توێژینەوەیەدا ڕێبازی وەسفی شیکاری-ڕەخنەیی بەکارهاتووە و نموونەکان وەرگیراون و شیکردنەوەیان بۆ کراوە و لەهەر شوێنێکیش هەڵە و کەموکووڕی بەدیکرابێ، سەرنج و ڕەخنە لە بارەیانەوە تۆمارکراوە. توێژینەوەکە بۆ دوو بەش، دابەشکراوه:
Abstract
Robotics manipulators with structural flexibility provide an attractive alternative to rigid robotics manipulators for many of the new and evolving applications in robotics. In certain applications their use is unavoidable. The increased complexity in modeling and control of such manipulators is offset by desirable performance enhancements in some respects. In this paperthe single- link flexible robotics manipulator was designed and implemented from Perspex and designed with 0.5 m length , 0.02 m width and with 0.004 m thickness with mass located at the tip. There are four subsystems; motion, control, accelerometer and gyro and a host computer subsystem. The work principle of single-link robotics manipul
... Show MoreWhen an electron moves from one atom or molecule to another, a charge-transfer complex is formed. The other objects must be able to accept these electrons, and one entity must have free electrons or a tendency to donate them. This resembles an internal oxidation-reduction reaction more. This research aims to shed light on charge transfer complexes formed by polyenes and carotenes, which act as electron-donating molecules due to their alternating double and single bonds. This allows them to create such complexes when interacting with organic molecules that lack electrons. These complexes exhibited distinctive optical and physicochemical properties, enabling them to be adapted for a wide range of applications. In addition, th
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
The Purpose of this study are analyze financial lease advantage through analyze and discuss financial lease cost, and achieve tax advantage to reach study objective. study include two firms ,oil firm and construction firm with limited liability. The inductive method is used for the applied part in analyzing the financial data of the companies considered in 2011-2015.The result of the study shows that the financial lease achieve present value of the costs is positive. This study found out the results that verify the hypothesis: The tax advantage of financial Leasing is characterized by decreasing cost and achieving higher tax shield. The study also found the most important recommendations of awareness of the benefits arising f
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show MoreA lotic ecosystem is considered a source of carbon dioxide (CO2) in the atmosphere where it becomes supersaturated with CO2, which contributes to the global carbon cycle. To enhance our comprehension of the roles of CO2 in rivers, an outdoor experiment was designed with controlled carbon source inputs to investigate the roles of the dissolved organic carbon (DOC) and dissolved inorganic carbon (DIC) in the phytoplankton community. Plastic enclosures were installed in the Tigris River within Baghdad for that goal. Samples were collected on the first day, as well as on the 5th and the 12th days from 14 enclosures. The enclosures were treated by artificial glucose (C6H12O6) (10, 20, 30mg/ l) as DOC sources, while sodium bicarbonate (NaHCO3) (1
... Show MoreThe aim of the research is to identify the methods of achieving mental health from an Islamic perspective by using an analytical approach. The methods that were explained: strengthen the spiritual side to control the motives and emotion s overcome the whims of the soul, fear of God and treat mental illness from an Islamic point of view by recognizing self, assurance, foresight, learning and acquiring new trends. Conclusion: we can achieve mental health by optimism, not despair, the compatibility of the Muslim with himself and with others, Consistency, emotional balance, and patience in difficult situations. Islam has attributes that make an individual feels psychological security. Thus, all these elements achiev
... Show More