Research in the field of biometric simulation is in the design of various and various industrial products, but it still needs new studies and research that are compatible with scientific and technological development, especially in the field of computing. Recognition, deduction, and simulation of nature, for example, the use of animal bones as tools in cutting, hunting or fighting, in addition to the use of animal drawings in cave drawings as symbols of strength, as well as dance movements and face painting to simulate the natural reality that surrounds humans. This trend developed to include simulation of nature in the formal and functional aspect to reach To vocabulary and solutions that help man in his daily life, the research problem is summarized in answering some questions, including what are the methods and methods that are used in bio-simulation and how to compare them, and is it possible to reach a new mechanism, but the objectives of the research were to reveal and compare the methodologies that address Biomimetics and the possibility of reaching a new mechanism in biomimetics. As for the research results, they were summarized as follows:
1- There are a number of methodological approaches that describe the way in which biomimetics are solved.
2- These methods only provide the way to achieve biomimetics, and their application is subject to the designer's direction and thinking.
3- It is important to study the dynamic form in detail in order to get the basic idea of the design.
The results show the inability to apply the Taylor rule within inflation and GDP Gaps because the monetary behave is elated from the Iraqi economy.
When applying the Taylor rule to exchange rate with the inflation and the output gap, the results do not match the nominal price announced by the central thing, which proves the lack of commitment by the Central Bank by using the Taylor rule, whether short-run interest rate or exchange rate (Nominal Anchor), so it did not stay to the Iraqi Central Bank only using the principle of Taylor with the expected inflation rate below the level of output (Macro activity) for the separation of monetary behavior from the real one o
... Show MoreAbstract
Sovereign wealth funds are an important tool for achieving economic stability and avoiding the local economy from external shocks, including the shocks of international oil prices. The spread of these funds is the result of large current account surpluses in many Asian and oil-exporting economies. These surpluses are due to higher commodity prices Has led to a rapid accumulation of foreign assets in central banks. Many countries with rent economies face the problem of their dependence on non-renewable natural resources, especially the oil countries, including Iraq. Oil revenues are more than 97% of oil exports, so they suffer from structural imbal
... Show MoreTo ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib
... Show MoreThe marketing of banking service is considered to be one of the impotent fields which showed a universal inebriates . He research showed the comparison between the application of marketing in ideas and application for loot government and private Iraqi bank. The research comets of four parts; Mythology / the concept and the importance of Banking Marketing / Research applichlion/ Conelnion and recommendation.
Summary
The book (Fatah al-Rahman reveals what is ambiguous in the Qur’an), which is a book of verbal similarities that tries to touch the Qur’an expression, and the subtle differences between its expressions and expressions. It appeared when it appeared in many chapters, from which I chose to delete in monolithic letters such as Ba and Ta, and to heal and delete in non-monosymbols such as (that) and (may) and (no), so the search came to two chapters The first is for deleting the monolithic letters, and the second is for deleting non-monosyllabic letters, preceded by introductory discussions revolving around the linguistic and idiomatic definition of deletion, a brief translation of the
... Show MoreThis research will deal in a simple way with the concept of urban expansion and taking the decision to sign the spatial signature of residential investment projects in order to reach through them in a real way to the extent of the proportionality of the decision taken, in light of the fulfillment of the conditions that must be met in the matter of making the decision of the spatial signature of the residential investment project and the extent of commitment to them, in which the conditions are: (Ease of access to services and transportation, adequacy of services, commitment to urban land uses) when establishing the investment project represented by the Al-Ayad residential project in the Hittin neighborhood of Al
... Show Moreملخص البحث
تبحث الدراسھ عن تنفیذ افضل لمفھوم التعلم مدى الحیاة كھیكل موجھ للسیاسة التربویة في العراق بشكل عام وفي
التعلیم العالي بشكل خاص. تحدد الدراسة استراتجیات التعلم مدى الحیاة وتناقش اھمیتھ وسماتھ الرئیسیة لتسھیل
الوصول الى فرص تعلم متمیز و ملائم لحاجات الطلبة مدى الحیاة، كما تناقش دور الجامعة في تحقیق ھذا الھدف.
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.