Research in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research problem is summarized in answering some questions, including what are the methods and methods that are used in bio-simulation and how to compare them, and is it possible to reach a new mechanism, but the objectives of the research were to reveal and compare the methodologies that address Biomimetics and the possibility of reaching a new mechanism in biomimetics. As for the research results, they were summarized as follows:
1- There are a number of methodological approaches that describe the way in which biomimetics are solved.
2- These methods only provide the way to achieve biomimetics, and their application is subject to the designer's direction and thinking.
3- It is important to study the dynamic form in detail in order to get the basic idea of the design.
The field of Optical Character Recognition (OCR) is the process of converting an image of text into a machine-readable text format. The classification of Arabic manuscripts in general is part of this field. In recent years, the processing of Arabian image databases by deep learning architectures has experienced a remarkable development. However, this remains insufficient to satisfy the enormous wealth of Arabic manuscripts. In this research, a deep learning architecture is used to address the issue of classifying Arabic letters written by hand. The method based on a convolutional neural network (CNN) architecture as a self-extractor and classifier. Considering the nature of the dataset images (binary images), the contours of the alphabet
... Show MoreBiodegradation is utilizing microorganisms to degrade materials into products that are safe for the
environment, such as carbon dioxide, water, and biomass. The current study aims to isolate and characterize
bacteria with polyethylene terephthalate (PET) degradation ability isolated from Shatt al-Arab water and
sewage from Basra, the bacteria were identified as Klebsiella pneumonia. According to the findings, the
isolates showed a highly significant difference in degradation of PET (24% during 7 days) and the percent of
degradation increased to 46% at 4 weeks compared to the control. The study also involved determining the
optimum temperature of K. pneumonia growth, which was 37°C, while the preferred
The present work aimed to study the effect of Grave's disease on the different tissues and organs of the body by using Wayne Thyrotoxicosis Diagnostic Index (WTDI) and Basel Metabolic Index (BMI). To reach such aim, (35) patients were involved (25 females and 10 males). A control group of (15) healthy individuals (10 females and 5 males) was selected for comparison , as well as , the following: 1- Wayne Thyrotoxicosis Diagnostic Index (WTDI) applied on patient group and control group under the supervision of specialist medical team , this index include (19) sign and symptom , the appearance of one of them may be lead to the others. The sings and symptoms of the index appear only on the patients. There is no Significant di
... Show MoreResin-modified glass ionomer cement tends to shrink due to polymerization of the resin component. Additionally, they are more prone to syneresis and imbibition during the setting process. This
The research aims to identify the effect of teaching according to the augmented reality on the technique of the visual thinking skills among scientific fifth-grade students in a biology course. In order to achieve the goal of the research, the researcher adopted the experimental approach with the partial set of the two equal groups with the dimensional test of visual thinking skills, The research population represented all the scientific students of the fifth grade for morning government schools affiliated to the General Directorate of Education of Baghdad / Karkh II, alshakerin preparatory for boys was chosen intentionally, in which two groups were chosen for this study, one group is chosen randomly as the control group via lottery, whe
... Show MoreThis paper aimed to investigate the effect of the height-to-length ratio of unreinforced masonry (URM) walls when loaded by a vertical load. The finite element (FE) method was implemented for modeling and analysis of URM wall. In this paper, ABAQUS, FE software with implicit solver was used to model and analysis URM walls subjected to a vertical load. In order to ensure the validity of Detailed Micro Model (DMM) in predicting the behavior of URM walls under vertical load, the results of the proposed model are compared with experimental results. Load-displacement relationship of the proposed numerical model is found of a good agreement with that of the published experimental results. Evidence shows that load-displacement curve obtained fro
... Show MoreA laboratory experiment has been carried out in the College of Science-University of Salahaddin to study the effect of different levels (0,5,10 and 15%) and sizes(250 and 1000µm) of walnut seeds residues and (160mg.kg-1) phosphorus fertilization on the concentration of phosphorus availability and alkaline phosphatase activity in calcareous soil during 15 and 30 days period of incubation, the experimental design in factorial complet randomize design (C.R.D) with three replications. The results indicated that the application of different levels of walnut seed residues decreases the concentration of phosphorus availability and alkaline phosphatase activity, however the results revealed that combination between levels and sizes o
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More