Preferred Language
Articles
/
jcofarts-1014
Mechanisms of designs inspired by nature and ways to develop them
...Show More Authors

 Research in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research problem is summarized in answering some questions, including what are the methods and methods that are used in bio-simulation and how to compare them, and is it possible to reach a new mechanism, but the objectives of the research were to reveal and compare the methodologies that address Biomimetics and the possibility of reaching a new mechanism in biomimetics. As for the research results, they were summarized as follows:
1- There are a number of methodological approaches that describe the way in which biomimetics are solved.
2- These methods only provide the way to achieve biomimetics, and their application is subject to the designer's direction and thinking.
3- It is important to study the dynamic form in detail in order to get the basic idea of the design.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Monetary Policy Management of the Money Supply to Interest rates in Iraqi Economy for the period 2004-2011
...Show More Authors

The results show the inability to apply the Taylor rule within inflation and GDP Gaps because the monetary behave is elated from the Iraqi economy.

When applying the Taylor rule to exchange rate with the inflation and the output gap, the results do not match the nominal price announced by the central thing, which proves the lack of commitment by the Central Bank by using the Taylor rule, whether short-run interest rate or exchange rate (Nominal Anchor),  so it did not stay to the Iraqi Central Bank only using the principle of Taylor with the expected inflation rate below the level of output (Macro activity) for the separation of monetary behavior from the real one o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Sovereign wealth funds have their role in reducing the price shocks of crude oil With reference to Iraq
...Show More Authors

Abstract

            Sovereign wealth funds are an important tool for achieving economic stability and avoiding the local economy from external shocks, including the shocks of international oil prices. The spread of these funds is the result of large current account surpluses in many Asian and oil-exporting economies. These surpluses are due to higher commodity prices Has led to a rapid accumulation of foreign assets in central banks. Many countries with rent economies face the problem of their dependence on non-renewable natural resources, especially the oil countries, including Iraq. Oil revenues are more than 97% of oil exports, so they suffer from structural imbal

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

To ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Capability to a chive An Effective Marketing Performance In Banks: applied Study in a sample of Iraqi Banks
...Show More Authors

The marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and  recommendation.

View Publication Preview PDF
Publication Date
Thu Dec 30 2021
Journal Name
College Of Islamic Sciences
The omission of letters according to Zakaria al-Ansari in his book (Fath al-Rahman by revealing what is ambiguous in the Qur’an)
...Show More Authors

 

Summary

The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The proportionality of decision taken to sign the AL-Ayadi residential investment project within the Hittin neighborhood in Baghdad by Urban filling style
...Show More Authors

This research will deal in a simple way with the concept of urban expansion and taking the decision to sign the spatial signature of residential investment projects in order to reach through them in a real way to the extent of the proportionality of the decision taken, in light of the fulfillment of the conditions that must be met in the matter of making the decision of the spatial signature of the residential investment project and the extent of commitment to them, in which the conditions are: (Ease of access to services and transportation, adequacy of services, commitment to urban land uses) when establishing the investment project represented by the Al-Ayad residential project in the Hittin neighborhood of Al

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
From Learning for Living to Lifelong Learning “Seek knowledge from the cradle to the grave” Prophet Mohammed’s saying: نجاة احمد الجبوري
...Show More Authors

ملخص البحث
تبحث الدراسھ عن تنفیذ افضل لمفھوم التعلم مدى الحیاة كھیكل موجھ للسیاسة التربویة في العراق بشكل عام وفي
التعلیم العالي بشكل خاص. تحدد الدراسة استراتجیات التعلم مدى الحیاة وتناقش اھمیتھ وسماتھ الرئیسیة لتسھیل
الوصول الى فرص تعلم متمیز و ملائم لحاجات الطلبة مدى الحیاة، كما تناقش دور الجامعة في تحقیق ھذا الھدف.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Tropical Medicine And Public Health
Morphological and Molecular Study of Biofilm Formation by Enterobacter cloacae
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Tue Feb 09 2016
Journal Name
World Journal Of Experimental Biosciences
Bioremoval of copper and zinc by filamentous alga Oscillatoria limnetica
...Show More Authors