This paper presents a comparative study of two learning algorithms for the nonlinear PID neural trajectory tracking controller for mobile robot in order to follow a pre-defined path. As simple and fast tuning technique, genetic and particle swarm optimization algorithms are used to tune the nonlinear PID neural controller's parameters to find the best velocities control actions of the right wheel and left wheel for the real mobile robot. Polywog wavelet activation function is used in the structure of the nonlinear PID neural controller. Simulation results (Matlab) and experimental work (LabVIEW) show that the proposed nonlinear PID controller with PSO
learning algorithm is more effective and robust than genetic learning algorithm; thi
The importance of this research is due to its importance goals, Which are about the attempt of researchers to investigate the probability of depending on businesses, environments to transform organizations, performance in away that enhance the leading role of organizations in their environments , and through views of a number of the staff working in the foundation of technical institutes in Mosul. .
After deciding the methodology of the study that ,in one hand ,performs the goals of the study , and achieving a suitable theoretical framework to present the concepts of businesses, environments and the leadin
... Show MoreBackground: Tumor necrosis factor-alpha (TNF-α) and interleukins play important roles in the pathogenesis of rheumatoid arthritis (RA). Genetic research has been employed to find many of the missing connections between genetic risk variations and causal genetic components. Objective: The goal of this study is to look at the genetic variations of TNF-α and interleukins in Iraqi RA patients and see how they relate to disease severity or response to biological therapy. Method: Using specific keywords, the authors conducted a systematic and comprehensive search to identify relevant Iraqi studies examining the genetic variations of TNF-α and interleukins in Iraqi RA patients and how they relate to disease severity or response to biolo
... Show MoreWith their strategic and geographical positions, Japan and Iraq are one of the major
countries in the world, especially to the United States. Japan lies near the two American
Continents, separated only by the Pacific and it is only normal to have the interests of both
countries crossed and joined in the Far East region. This made the occupation of Japan an
inventible matter in the second half of the 20th century. Iraq, on the other hand, has strategic
position in the Middle East, being surrounded by many active countries like Turkey, Iran, and
Gulf countries, besides Iraq’s oil wealth which is needed by such industrial country like the
United States.
Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreClass consciousness represents its highest stage in the contemporary Marxist thought of Rosa Luxemburg and Antonio Gramsci, not just a reflection of reality, but rather a dialectical form through the reflection of consciousness on reality and its reproduction. The superiority over the infrastructure (historical materialism) promised the revolutionary class consciousness to be achieved spontaneously, and the seeds of a breakthrough are mass strikes, denying the role of the party to organize this awareness, limiting its role to the interconnection between classes, emphasizing the role of socialist democracy as a conscious vanguard for organizing spontaneity, struggle, and developing awareness during the revolutionary process and the leader
... Show MoreAbstract: This article is a comparative analysis of the concept and types of homonyms in Russian and Arabic. Homonyms are lexical units that have the same sound but different meanings. The study of homonymy in different languages can help reveal the features of the semantic structure and syntactic rules of each language. The article discusses the main aspects of homonymy in Russian and Arabic, as well as a comparative analysis of the types of homonyms that exist in both languages. The study includes an analysis of the semantic meanings of homonyms, their use in context, and possible differences in syntactic features that may affect their interpretation and perception by native speakers of these languages. The purpose of the article is to id
... Show MoreBackground: Genetic factors play an important role in susceptibility to Guillain Barre' syndrome. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Aim of the study: to assess the relationship between HLA-A alleles with Guillain Barre' syndrome (GBS) compared with a healthy control group using PCR-SSOP method.Type of the study: Cross-sectional study.Patients and methods:Patient's group consisted of 30 Iraqi Arab Muslims patients with Guillain Barre' syndrome that consulted the Neurological department in Neurosciences Hospital between January-2013 to January- 2014 were genotyped for HLA-A alleles. A control group consisted of 30 healthy volunteers among the staff of AL-Kindi College of Medicine that
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More