The current research discussed biophysics data as a theoretical and applied knowledge base linking industrial design with the natural sciences at the level of applied strategies through which we can enrich the knowledge base of industrial design. The research focused on two main aspects of the scientific references for biophysics, namely: electromagnetism, and biomechanics. According to the performance and functional applications in designing the functions of industrial products at the electromagnetic level, it was found that remote sensing applications: such as fire sensors that were adopted from the insect (Black Beetle) and that their metaphors enable them to hear fire, and collision sensors, which were adopted from the insect (locust) , And its ability to fly in large swarms without colliding with one another, and the location echo sensors that were adopted from (bats), which moves without having a sense of sight, and sound sensors that were adopted from (dolphins). we found that all of these biological features broadened the designer’s understanding of the biological world, and the breadth of knowledge base of industrial designer, which enabled him to design products bearing solutions to problems that were not easily solved without understanding the biological structures of these organisms. In terms of biomechanics, it was found that the processes of analyzing and interpreting the nature and structures of humans and insects, according to the nature of the mechanical structures of each of them, enabled the designer to find many types of products based on adopting the nature of the structural composition of these organisms, which strengthened the possibility of physical application of New ideas and solutions to problems that were not easy to solve without a good understanding of what biophysics is and how living things interact in their natural environments.
New nitrone and selenonitrone compounds were synthesized. The condensation method between N-(2-hydroxyethyl) hydroxylamine and substituted carbonyl compounds such as [benzil, 4, 4́-dichlorobenzil and 2,2́ -dinitrobenzil] afforded a variety of new nitrone compounds while the condensation between N-benzylhydroxylamine and substituted selenocarbonyl compounds such as [di(4-fluorobenzoyl) diselenide and (4-chlorobenzoyl selenonitrile] obtained selenonitrone compounds. The condensation of N-4-chlorophenylhydroxylamine with dibenzoyl diselenide obtained another type of selenonitrone compounds. The structures of the synthesized compounds were assigned based on spectroscopic data (FT-IR,
... Show MoreSummary of the research Family violence, its causes and effects on society (women and children). Search Goal: The current research aims to identify: 1. Causes of family and social violence (for children and women). 2. How to process. research importance : Domestic violence is a major and devastating problem that has a negative and direct impact on children in particular and women or mothers in general. The problem of domestic violence is linked to many factors and individual, social, economic, psychological and environmental variables, which makes one theory that claims to be inaccurate. It is difficult to understand the nature of family violence without linking it to some of the concepts related to it. The negative effects that may lead
... Show MoreAs the word can fluctuate between central and peripheral dlalten it represents the first lexical meaning and the second represents the meaning that gain by the context in which it appear so this research came to show signs that can be acquired the root ( GUM ) and its derivatives from the contexts in which it is mentioned in the Koran as well as siqnificant Lexical if this research is divided on two first is eating Lexical semantics , the second handled connotations in the Koran was based on what the commentators and concemed with the meanings of the Koran and the owners Almagamat in astatement that the semantic .
Abstract\
The value chain analysis is main tools to achieve effective and efficient cost management; it requires a depth and comprehensive understanding for all internal and external activities associated with creating value. Supply chain as apart of value chain, that means managing it in active and efficient can achieve great results when adopting a comprehensive and integrated performance for these two chains activities. The research aims to identify possible ways to integrate the performance of value and supply chains of the sample" Kufa-cement plant" and determine the effect of this integration in enhancing customer value. The research arrival that logical and integrated analysis of value and supply chains helps
... Show MoreThe Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function,
... Show MoreThis article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t
... Show MoreThe research aims to study strategic training and its impact on improving the performance of the inspectors general offices in Iraqi ministries, through two variables strategic training Which include Four Dimensions ( Strategic analysis , Formulation of Training Strategy , Implement the Training Strategy , Evaluation ) and Performance included Three dimensions ( Efficiency , Effectiveness , Added-Value).
This research problem is that the Offices of Inspectors rely on pre-made training Programs received from training centers without designing the training programs that provide the employees with the skills and abilities that lead to the implementation of the current and future goals of the orga
... Show MoreThe aim of the research is to investigate potential effects of the finance industry and block-chain to general business of financing in particular, as well as its shortcomings and difficulties. To answer the research questions, the researcher used the objective narrative-analytical descriptive approach and included a qualitative analysis of Blockchain technology. The process of Blockchain technology based on their industries, the authors were selected based on their reputation in the Blockchain field. The research found that Blockchain can improve the efficiency of the banking industry's various sections. It has the ability to upgrade and transfer wages across borders, financial reporting and compliance, as well as trade finance
... Show MoreThe issue of penalized regression model has received considerable critical attention to variable selection. It plays an essential role in dealing with high dimensional data. Arctangent denoted by the Atan penalty has been used in both estimation and variable selection as an efficient method recently. However, the Atan penalty is very sensitive to outliers in response to variables or heavy-tailed error distribution. While the least absolute deviation is a good method to get robustness in regression estimation. The specific objective of this research is to propose a robust Atan estimator from combining these two ideas at once. Simulation experiments and real data applications show that the p
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More