In this paper, variable gain nonlinear PD and PI fuzzy logic controllers are designed and the effect of the variable gain characteristic of these controllers is analyzed to show its contribution in enhancing the performance of the closed loop system over a conventional linear PID controller. Simulation results and time domain performance characteristics show how these fuzzy controllers outperform the conventional PID controller when used to control a nonlinear plant and a plant that has time delay.
To study the response of the celery plant to nitrogen fertilization and spray with salicylic acid in the leaves content of nutrients, the research was conducted in one of the fields of the Department of Horticulture and Gardening Engineering / College of Agriculture / University of Baghdad within the 2019-2018 season. The research was carried out as a global experiment and with the design of complete randomized sectors (RCBD) and with three replicates, the first factor included the addition of nitrogen with three levels and its symbol (N) (N1 control), (N2) g / m2 18 ), (N3) 37 g / m2 and the second factor spraying acid salicylic is denoted by
The study is aimed at social support to the students of the College of Education for women (The research sample) and measuring the quality of life at students of the College of Education for women (The research sample) And to identify the relationship between social support and quality of life of students of the College Education for Women and research sample consisted of 200 students The adoption of the resolution as a tool for data collection and the most important results of the search results that the students of the College Education for Women have social support. In other words, parents and friends are supporting the students. The students have the quality of life any positive meaning to life and that when a person has a quality of
... Show MoreThe place in which the person lives and his geographical and social environment have a great impact on building his personality, belief and culture, Islam has alerted the importance of the Muslim to make sure to choose the appropriate place in which he resides and dwells in that it is compatible with his religion and belief in order to ensure communication with Islamic knowledge in a way that enhances his belief Arabization occurs when a person makes himself an Arab by living the life of the Bedouins, and creates the morals of the Bedouins from the inhabitants of the Badia with its harshness, cruelty, ignorance and lack of understanding in religion and far from the sources of knowledge of Islamic knowledge. Blasphemy and polytheism, and
... Show MoreThe research deals with the lyrical introduction in the commentary of Tarfa bin al-Abd as a formative system characterized by flexibility and richness of imagination, which achieved a formative treatment and a unique construction within the structures of the structural and semantic language. I dealt with the poetic verses represented by the lyrical introduction as a formative hypothesis, basing its goal on a methodological framework distributed on the problem that was summarized by the following question: Is it possible to look at the poetic pattern within the pre-Islamic poem / hanging blinking as a model, in its plastic dimensions and to identify the stylistic treatment that achieves the formation space within the poetic text. The rese
... Show MoreIn hemodialysis patients, pain associated with needle insertion into an arteriovenous fistula is a physical and psychological problem. The aim of this study was to assess the effectiveness of pre‐puncture application of an ice pack, EMLA cream, or lidocaine spray to reduce pain associated with access puncture.
This was a multicenter study done in nine hemodialysis centers in Iraq. The study utilized a randomized, parallel‐group design, in which patients being dialyzed using an arteriovenous access were allocated into one of four groups. Access puncture was preceded by nothing (contr
Actual and effective organizational dynamic capabilities in the work environment contribute to a number of factors that contribute to the organization's ability to manage its human talents. Thus, the study sought to identify the level of contribution of organizational dynamic capabilities to human talent management based on their dimensions in the investigated organization by determining the level of relationship and impact between these variables. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate sample of (42) administrative leaders in the investigated organization and adopte
... Show MoreThe recognition of the dynamic organizational capabilities in their actual and influential extent in the work environment achieves a set of positive data that can fall under the addition axes, particularly with regard to the organization's ability to manage human talents in them, so the researchers sought to identify the level of contribution of dynamic organizational capabilities in the management of human talents in terms of Keep them away in the research organization by indicating the level of relationship and impact between them. The presidency of Mosul University was chosen as a field for the current study, and data were collected by adopting the questionnaire form as the main tool for the study. The study used a deliberate
... Show MoreCryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p
... Show More