Piracy is one of the most important problems faced by sound record producers, because it is a problem that technology, evolves with the development of time and and although piracy is not a new problem, it has received great attention in recent years, because of the means by which (the Internet) and its size result from it, even In many of the ruler, describing it as (the crime of nd she participated in the great the electronic age) aharm it causes to all the groups involved in it producing the sound recording, because there are three categories that contribute to the production of the sound recording, which is (the author of the recorded work, the st who performs the work and the producer who artiperforms an operation Performance recording and its transfer to and distribution of records), these three categories mentioned above are affected by the piracy ten process in general terms, the author and artist ofhave a certain percentage of the profits achieved by the sound recording, when piracy of this recording in any way, this will lead to the loss of a large part of the And consequently the effect on the financial , profitsree groups compensation mentioned by the thmentioned above is received.
In today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreThe banking sector has a significant impact on the economic growth of the country, and the importance of this sector must assess its financial performance from time to time, to measure the situation related to money for each bank and how to put the supervision of the efficiency of the full. The research aims at evaluating the financial performance according to the elements of the CAMELS model, which including capital adequacy, asset quality, management efficiency, profitability, liquidity and market risk sensitivity. The research included the study of Al-Mansour Investment Bank during the period from 2014 to 2018. The base capital ratio was used to total assets to measure capital adequacy The proportion of investments to total assets to mea
... Show MoreCapital is a property bank is very important, because it is part of the liquidity in the bank, which is a line of defense in the bank and secured against any losses that may be exposed to the banks, and in the case of low value of any item of the assets and the lack of a dedicated absorb the decline, while play a key role to some extent in the financing of fixed assets and in particular the relative importance of fixed assets is relatively small compared to the size of bank assets. &n
... Show Moreيتناول هـذا البحث بالتحليل التفاعل و التنسيق بين السياستين الماليـة و النقديـة و اثر هذا التفاعل و التنسيق على الاستقـرار و النمـو الاقتصـادي، و كيف ان الآثار المالية للسياسة النقدية قد تحفز الإجراءات الخاصة بالسياسة النقدية و معالجة الآثـار الجانبيـة و طبيعـة التفاعل و الارتداد بين إجراءات كلتا السياستين و أثرهما في التـوازن الاقتصـادي العــام، و تم في ثنايا البحث توضيح مسوغات التنسيق و مدى ضرورة ذلك بهد
... Show Moreالمقدمة:
مع مطلع القرن الحادي والعشرين فأن الصراع على امدادات المياه الحيوية هو خطر قائم على الدوام في جميع مناطق العالم حيث يتجاوز الطلب على الماء بشكل كبير العرض القائم ولكون اغلب المصادر الرئيسة للمياه وخاصة في المنطقة العربية يشترك فيها بلدان أو أكثر ولان هذه الدول نادرا ما توافق على الاجراءات التفاوضية الخاصة بأقتسام الامداد المتاح من المياه مما يعني زيادة الخلافات على الوصول الى الم
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreThis study aims to studying of Person and organization’s environment fit in a sample of Private bank’s reflection in its basic dimensions (Person-organization fit ,Person-Job fit, Person-group fit and Person- Person-fit )in the Work Outcomes (job satisfaction, the intention to leave the job, Job Engagement, and organizational citizenship behavior ).
The questionnair’e has been used as a basic instrument to gather data , As well as personal interviews with some of the staff of the research sample of private banks which were represented by (5) and included banks (Bank of Assyria for investment, the North Bank for Finance and Investment , Bank of the Tigris
... Show MoreThe research aims to build an educational program - learning, according to the concepts of renewable energy and nanotechnology And knowledge of its impact on the technological enlightenment when the third phase students in the Department of Chemistry, and to verify the goal and put the researcher null hypothesis the following: No Statistically significant difference at the level (0.05) between the average scores of the experimental group students who are studying material nanotechnology and renewable energy program Altalima- learning and the average score for the control group of students who are studying the same article the usual way in technological enlightenment. The search was limited to the third row in the Department of Chemistry,
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More