The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process
The problem of independent motion control of mobile robot (МR) in conditions when unforeseen changes of conditions of interaction of wheels with a surface are considered. An example of such changes can be sudden entrance МR a slippery surface. The deployment of an autonomous unmanned ground vehicle for field applications provides the means by which the risk to personnel can be minimized and operational capabilities improved. In rough terrain, it is critical for mobile robots to maintain good wheel traction. Wheel slip could cause the rover to lose control and become trapped. This paper describes the application of fuzzy control to a feedback system within slippery environment. The study is conducted on an example of М
... Show MoreThe research includes a bout IL- IQulle , and their role in scientific of the Islamic – Arabic civilization , for Dr. Khlood M.Namma the proff in the collage of education for woman , Baghdad university , History department
The issue of volunteerism is one of the most important issues that have become prominent in social sciences and contemporary social thought, especially as a result of the transformations and changes that the world undergoes today. The voluntary sector has become the concern of all societies and governments for its development and service to society and various sectors. The practice of women is prominent in the work of volunteerism after 2003 in Iraq, but its work face a number of obstacles and hindrance. The problem of research is the obstacles of women's work in non-governmental organizations. The research aims to identify the nature and characteristics of volunteer work of Iraqi women. &nb
... Show MoreStill Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations
T
... Show MoreThe Abbasid Caliphate generally paid attention to the financial aspect through the collection of resources , And also in terms of spending these resources
Context and its influence in direction of reference by Abi Hussein Al Basri
The oil sector in Iraq suffered from several difficulties led to the decline and reduction of oil production and the deterioration of refineries and transport pipeline status in addition to the weakness of the technology side and the prevalence of financial and administrative corruption besides the high costs of rehabilitation of the oil sector and also administrative and institutional problems still ongoing.
In spite of Iraq's possession of vast oil wealth allows him to play an important role in the international energy market، he is still under the level. The production of oil doesn'<
... Show MoreThe use of story to convey educational content which serves particular purposes is common use long ago, such as we see in Quran`s stories and bible stories which consider good examples, therefore the story individuates by this mission which has magnificent influence minds of the readers.
The Hasidic story is one of Hebrew literature affluents from it`s outset, therefore it has distinctive role in spread thoughts and principles which comes and believes it the Hasidic movement which considers reformatory Jewish religious movement. It aims to reforms the Jewish individual avvording to it`s vision and thoughts.
This paper research contains an introduction which presets s
... Show MoreSince Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show More