Preferred Language
Articles
/
NhZCZIkBVTCNdQwCYomC
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Cost of Optimum Design of Trunk Mains Network Using Geographical Information System and Support Programs
...Show More Authors

Sewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.

 In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of Educational And Psychological Researches
(تقويم كتاب الحاسوب للصف الثاني المتوسط وفقاً للتنور التقني ومقترحات تطويره)
...Show More Authors

 The aim of the current research was to evaluate the content of the computer textbook for second grade intermediate in Iraq in accordance with the technological literacy and submitting developmental suggestions, the researchers adopted the descriptive and analytical approach. The researchers used as a population and sample of thier research are the content of the computer textbook for second grade intermediate. 

In order to prepare the first draft of the research tool that content the five technological literacy fields (The Nature of Technology, Technology and Society, Design, Abilities of Technological World, The Designed World).

The researchers distributed the first d

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
تحليل محتوى كتاب الحاسوب للصف الثاني متوسط وفق مهارات التفكير المنطقي
...Show More Authors

يهدف البحث الحالي إلى تحليل محتوى كتاب الحاسوب للصف الثاني متوسط وفق مهارات التفكير المنطقي للعام الدراسي(2015- 2016)م, ولتحقيق ذلك تم استخدام المنهج الوصفي التحليلي (تحليل محتوى) لملاءمته لطبيعة هدف البحث, وتم اعداد أداة البحث بالأعتماد على قائمة مهارات التفكير المنطقي بعد مراجعة الأدبيات والدراسات السابقة, وتم عرضها على مجموعة من المحكمين المتخصصين في المناهج وطرائق التدريس وعلم النفس وعلم الحاسبات والقياس

... Show More
View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Suggestive Framework for Applying Performance and Programs Budget in Iraqi Government Units Environment
...Show More Authors

Abstract

This research  aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This  is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
A computer experiment to study the charging process of dust grains in negative ion plasma
...Show More Authors

This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).

View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Journal Of Engineering
Orbital Prosthesis Rehabilitation in Biomedical Engineering by Means of Computer Vision-Photogrammetry and 3D Prototyping
...Show More Authors

Eye loss may be caused as a result of eye trauma, accidents, or malignant tumors, which leads the patient to undergo surgery to remove the damaged parts. This research examines the potential of computer vision represented by Structure from Motion (SfM) photogrammetry in fabricating the orbital prosthesis as a noninvasive and low-cost technique. A low-cost camera was used to collect the data towards extracting the dense 3D data of the patient facial features following Structure from Motion-Multi View Stereo (SfM-MVS) algorithms. To restore the defective orbital, a Reverse Engineering (RE) based approach has been applied using the similarity RE algorithms based on the opposite healthy eye to rehabilitate the defected orbital precisely

... Show More
View Publication
Crossref
Publication Date
Thu Jul 08 2021
Journal Name
Turkish Online Journal Of Qualitative Inquiry (tojqi)
Civil Protection of Rights contiguous to Author’s Royalty in Iraqi Law A comparative study
...Show More Authors

Preview PDF