Preferred Language
Articles
/
NhZCZIkBVTCNdQwCYomC
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 15 2025
Journal Name
Al–bahith Al–a'alami
Cultural and educational values for children
...Show More Authors

Programs directed to children through the media in general and in television in particular are among the main factors that help in forming the cultural and educational values of this important segment of society, and in light of this the study problem was identified in answering a major question: What are the cultural and educational values that Ajyal channel seeks Space planted in children through my program, Iftah Ya Simsim (in its new season) and Friends of Ajyal? , While the objectives of the study were evident in identifying the most prominent cultural and educational values that the Ajyal satellite channel worked to instill in children, and identifying the nature of the techniques used by Ajyal channel in providing the value conten

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Constructing a Digital Certificate Authentication System for Classified Documents
...Show More Authors

             In this paper, we introduce a new digital authentication certification system to keep the classified documents' information safe. The proposed system is a steganography system divided into two subsystems, the first subsystem is responsible for embedding the information about the person, and it works in the main foundation that issues the documents, while the second subsystem is found in the beneficiary directorates to extract the true information of the person.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Digital modeling and its technical variables in contemporary interior design
...Show More Authors

The current research sheds light on an important aspect of the great and rapid development in the field of science and technology and modern manufacturing methods as a result of the scientific revolution resulting from the accelerated cognitive development, which prompted designers in general and interior design in particular to exploit and invest in digital technology and the development of digital control in the process of designing the industrial product for the purpose of creativity and innovation through these digital programs Digital models achieve the requirements and desires of the interior designer according to the creative skill using modern software with high efficiency And extreme accuracy that is consistent with the requirem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
المشكالت الصحية المرافقة لالستخدام الخاطئ للحاسوب في مدينة بغداد
...Show More Authors

The Research aimed for identification the significant of health problems that occurrences through
misused of computer for those whom attaches with more than two hours daily and to identification the
nature of demographical characteristics variables and that related variables with using computer. Also to
know the level of user’s knowledge for some attaché’s equipment's and finally creating a new suggested
measurement scale for studying health problems that were occurred through misused of computer.
Creating questionnaire includes several domains (Social problems – family environment, Social problems –
external environment, some health problems attaches with related equipment's, psychological problems,
and hea

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design for Two Electrodes Electrostatic Mirror by using the Bimurzaev Technique
...Show More Authors

This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic  mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The  beam path  by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta  method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the op

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Feb 08 2023
Journal Name
Iraqi Journal Of Science
udyStudyStudyStudyStudy of of the Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extractthe Efficiency of Extract
...Show More Authors

The aim of current study is estimate the ability of low cost adsorbents, which consist of extracted silica from rice husk ash in treatment of Industrial waste water that contains heavy metals (Cd, Co and Pb) with other pollutants by fixed filters technique with determine the best method for that, and study the effect of a number of variables and parameters. This study involved one waste water samples were collected from. State battery manufacturing company (SBMC) (before treatment unit) at 5th and 22th, of the January 2015. Adsorption tests showed that all tested adsorbent materials had a significant heavy metal removal efficiency. pH values showed a significant impact on adsorption process, but best removal efficiency occurred at pH 4.5

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Utilising modelling software to convert functional utensils into ceramic art.
...Show More Authors

Contemporary art has been widely affected by technology, and ceramics production is no exception. As an ancient art that originates from clay and other humble materials found in the ground, ceramics is considered one of the most adaptable art forms. Once it is realised how flexible ceramics as a material is, it can be easily altered into endless forms and shapes. Therefore, it is vital for ceramics practitioners to find a relationship between this wonderful material and the media of contemporary art, culture and modelling software or technology in general so that they can take their deformable art pieces to a whole new level. Such a relationship is worth investigating. Thus, for the purposes of this research, several ceramic pieces were

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 17 2019
Journal Name
Journal Of Economics And Administrative Sciences
الجزائر بين محاولتين من أجل التنمية: شروط النجاح وأسباب الإخفاق
...Show More Authors

سجلت الدولة الجزائرية محاولتين من أجل التنمية، بهما أرادت القضاء على كل مخلفات الاستعمار الفرنسي، من فقر وجهل وأمراض وحرمان من أبسط ضرورات الحياة، كما عملت جاهدة على أن تكون دولة لها مكانة في صفوف الدول الصاعدة على الأقل، لما حباها الله من موارد مادية ومالية وبشرية، وموقع جيو استراتيجي، قلت مثيلة في العالم، بالنسبة لمساحتها الجغرافية الكبيرة وتنوع تضاريسها الطبيعية، وترتيبها المتقدم في الطا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Innovative Research In Science, Engineering And Technology
Nasal Prosthesis Fabrication using Rapid Prototyping and 3D Printing (A Case Study)
...Show More Authors

Abstract: Facial defects resulting from neoplasms, congenital, acquired malformations or trauma can be restored with facial prosthesis using different materials and retention methods to achieve life-like look and function. A nasal prosthesis can re-establish aesthetic form and anatomic contours for mid-facial defects, often more effectively than by surgical reconstruction as the nose is relatively immobile structure. For successful results, lot of factors such as harmony, texture, color matching and blending of tissue interface with the prosthesis are important. The aim of this study is to describe the non-surgical rehabilitation with nasal prosthesis for an Iraqi patient who received rhinectomy as a result of squamous cell carcinoma of the

... Show More
View Publication Preview PDF