Preferred Language
Articles
/
NhZCZIkBVTCNdQwCYomC
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Journal Of Kufa Legal And Political Science
The legal system of mandatory mediation as a mean of setting disputes Comparative analytical study
...Show More Authors

The mediation system is based on settling the dispute amicably through the intervention of a third party by bringing views closer away from the judiciary, which is an amicable way to settle disputes, which disputants resort to voluntarily, but some Western legislation has begun to impose resorting to mediation to settle disputes compulsorily, to take advantage of its advantages, get rid of the disadvantages of resorting to the judiciary in some disputes, and relieve pressure on the courts.

Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Budget Programs and Performance away to enhance the control in government economic units
...Show More Authors

     The control function of important functions in the system of government for several reasons , perhaps the most important of the magnitude of spending and spending in one of the tools adopted in the implementation of the control function.                               

        Perhaps the most prominent stages of the development budget in terms of setup and use in the budget programs and performance , as specialized literature  show its importance in strengthening financial and operationl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 01 2018
Journal Name
دراسات عربية في التربية وعلم النفس
تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة وفقاً لعمليات العلم
...Show More Authors

يهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لعمليات العلم عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر عمليات العلم في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة المعتمدان من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2016-2017) م؟ اعتمد هذا البحث المنهج الوصفي التحليلي، وتضمن مجتمع البحث وعينته محتوى كتابي الحاسوب المقررين لطلبة الصفين

... Show More
Publication Date
Tue Jul 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الظواهر السلوكية غير المرغوب فيها لدى مستخدمي الحاسوب والإنترنت
...Show More Authors

أهمية البحث والحاجة إليه:

          من مظاهر التواصل الحضاري في جانبه العلمي والتكنولوجي هو متابعة أبناء مجتمعنا ولاسيما الشباب لكل منجز حديث واتخاذه وسيلة للحصول على المعلومات والمعرفة والتسلية، بحيث أصبح هذا التعامل ممارسة يومية حياتية، وهذا دليل على مدى تفتح ذهنية وعقلية ورغبات أبنائنا ومواكبتهم لروح العصر ومتطلباته وتعبيراً صادقاً عنه فضلاً عن إشغال أوقات ف

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2021
Journal Name
مجلة العلوم القانونية والسياسية
الحماية الجنائية لأمن الدولة الداخلي في ظل حروب الجيل الرابع
...Show More Authors

تناول البحث موضوعاً شديد الأهمية وهو الأمن الاجتماعي منظور اليه في سياق الحماية الجنائية لأمن الدولة والتحديات التي يتعرض لها بعد حصول تغيير حاسم في أساليب الحرب. كما يقدم البحث تقسيماً مختلفاً لأجيال الحروب نقتصر على اربعة منها استناداً إلى التغيير في أهداف الحرب الاستراتيجية وليس إلى مجرد وسائل ارتكابها لان هذه الوسائل لا تصلح لوصف التغييرات الحقيقية في أنماط الحروب والاهداف التي تسعى إلى تحقيقها. ويؤكد

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks
...Show More Authors

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Medical Child Abuse and Child Protection
...Show More Authors

Background

Medical child abuse describes a child receiving unnecessary, harmful, or potentially harmful medical care at the caretaker's instigation.

Objectives

To focus on medical child abuse as an entity and emphasize its epidemiology, clinical presentations, prevention, and management.

Results

In the UK, the annual incidence of medical child abuse in children below one year increased to 3:100,000, while its prevalence in Arabs, including Iraq, is ambiguous due to lack of evidence and improper clinician's awareness. The mean age at diagnosis is 14 months to 2.7 years. Female caregivers are the most common offenders. Clinically, medical child abuse

... Show More
View Publication Preview PDF
Crossref