The probability is considered one of the grammatical cases in all languages of the world. Expressions of probability in Spanish language are expressed by various structures, expressions and some verb tenses. By this study explains the grammatical cases, the verbal periphrases, the impersonal expressions, the future tenses (simple and perfect) and the conditional mode of probability in Spanish language .We have explains these cases in detail with examples that have extracted from various spanish grammar books .The specific objective of this study is to know the resources and constructions of probability in Spanish language and their translation in Arabic language.
After completion of the artistic production, the artist plays the echo of this production upon the recipient. Whether this recipient is from the public, art connoisseurs, or private artists, critics and academics. In the past, the boundaries of Time and place had a great effect in limiting this echo or its quality, as the views of the recipients were largely influenced by the prevailing thought or the artistic trends that dominate the artistic scene in the surrounding environment in which the artist created. In order for the artist to show works for the widest segment of the recipient, he bears the burden of the costs of transporting the work, a keeper of damage on the move, and the material amounts that may hinder the publication of the
... Show MoreThe OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extra road) and
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show MoreA total of 45 voucher specimens of falcons which are deposited in the bird's collection of the Iraq Natural History Research Center and Museum (INHM) were reviewed. Mummified falcons were preserved as voucher study specimens and tagged with museum collection labels. In the current study, morphometrics of six species of the genus Falco Linnaeus, 1758: Lanner falcon F. biarmicus Temminck, 1825; Sacker Falcon F. cherrug Gray, 1834; Lesser Kestrel F. naumanni Fleischer, 1818; Peregrine Falcon F. peregrines Tunstall, 1771; Eurasian Hobby F. subbuteo Linnaeus, 1758 and Common Kestrel F. tinnunculus Linnaeus, 1758 were documented. These species were recorded previously in the ornithological literatures by several authors and deposited in t
... Show MoreIntroduction: Cutaneous leishmaniasis (CL) is a common protozoan disease in Iraq characterized by localized ulcers, primarily on exposed skin. This study aimed to investigate the hematological parameters of infected patients using a complete blood count (CBC) in the endemic area of Diyala Governorate, northeast of Baghdad. This has been studied in newly diagnosed, untreated individuals and patients receiving sodium antimony gluconate. Methodology: Hematological screening was performed on blood samples from 161 patients with microscopically diagnosed cutaneous leishmaniasis before and after treatment. Anti-Leishmania IgG was also assessed by ELISA in seropositive and seronegative subjects. Results: The newly diagnosed, untreated pati
... Show MoreIn this research the results of applying Artificial Neural Networks with modified activation function to
perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance
Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of
identification strategy consists of a feed-forward neural network with a modified activation function that
operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have
been trained online and offline have been used, without requiring any previous knowledge about the
system to be identified. The activation function that is used in the hidden layer in FFNN is a modified
version of the wavelet func
Visualization of water flow around different bluff bodies at different Reynolds number ranging (1505 - 2492) was realized by designing and building a test rig which contains an open channel capable to ensure water velocity range (4-8cm/s) in this channel. Hydrogen bubbles generated from the ionized water using DC power supply are visualized by a light source and photographed by a digital camera. Flow pattern around a circular disk of (3.6cm) diameter and (3mm) thickness, a sphere of (3.8cm) diameter and a cylinder of
(3.2cm) diameter and (10cm) length are studied qualitatively. Parameters of the vortex ring generated in the wake region of the disk and the separation angle of water stream lines from the surface of the sphere are plott
My research to study the processes of the creation of shapes and encrypt any encryption in design forms and contents of computer technology as the creative property of definable and renewal, change and transformation process of transformative theme of shape, form and content encryption process in textile designs lets us know the meaning or substance which may be invisible to the encryption in the digital design of fabrics is a recruitment ideas modern and refined through a technique to accomplish the work of a beautiful audiences with novelty and innovation. The search includes four chapters:1Chapter I deal with the problem of research and its current research (form and content encryption with digital designs in women's contemporary fabr
... Show More