Preferred Language
Articles
/
NhZCZIkBVTCNdQwCYomC
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 09 2021
Journal Name
Political Sciences Journal
Obstacles to reforming the Security Council and new international changes
...Show More Authors

The international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.

View Publication Preview PDF
Crossref
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Color Image Steganography Based on Discrete Wavelet and Discrete Cosine Transforms
...Show More Authors

        The secure data transmission over internet is achieved using Steganography. It is the art and science of concealing information in unremarkable cover media so as not to arouse an observer’s suspicion. In this paper the color cover image is divided into equally four parts, for each part select one channel from each part( Red, or Green, or  Blue), choosing one of these channel depending on the high color ratio in that part. The chosen part is decomposing into four parts {LL, HL, LH, HH} by using discrete wavelet transform. The hiding image is divided into four part n*n then apply DCT on each part. Finally the four DCT coefficient parts embedding in four high frequency sub-bands {HH} in

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Digital transformation technology in the insurance service in the National Insurance Company and the Iraqi General Insurance Company : applied research
...Show More Authors

The aim of this research is to identify the impact of the effectiveness of digital transformation technology in improving the efficiency of the insurance service in the public insurance companies in Iraq through digital transformation technology in the insurance process "promotion of the insurance product, submission of insurance application, underwriting, settlement of losses" and to achieve this goal a questionnaire was designed A survey distributed in the surveyed community Which represents the decision makers in the researched companies under study, and one of the most important results of the research was the existence of a relationship between digital transformation and improving the efficiency of the insurance process, whether thr

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Remotely Sensing Digital Methods For Dust Storms Monitoring In Iraq
...Show More Authors

In this research, attempt to overcome and quantities the problem of the large number of frequency of dust storms and the areas that generated and then identifying these areas in order to be held by the agricultural areas, as has been the adoption of many of the techniques and methods of processing image in remote sensing and geographic information systems and linking them together to identify those areas in Iraq or the neighbors, especially the northern and north-west wind of the fact that Iraq is in the northern and north - western most days of the year. Research has included the use of images from the satellite (MODIS) with quality (Aqua) and (Terra) with the assembly of the amount of dust, these storms, it was determining the values o

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Partial Cryptography in Digital Media Environment Based on ECC Algebra
...Show More Authors

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers and product developers due to its robust mathematical structure and
highest security compared to other existing algorithms like RSA. It is found to give
an increased security compared to RSA for the same key-size or same security as
RSA with less key size. In this paper a new approach is proposed for encrypting
digital image using the arithmetic of elliptic curve algebra. The proposed approach
produced a new mask for encrypt the digital image by use a new convolution
processes based on ECC algebra operations and work as symmetric cryptographic
system instead of asymmetric system. A new approach combined both compression

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Employing digital marketing through communication in promoting the commercial product
...Show More Authors

In recent years, the means of communication have achieved a great generality that made them occupy, in a short time, the first ranks among the most widely used social networks in the world, due to the many services and advantages offered by this network to its users. It has led to a leap in the field of visual communication, especially since it relies mainly on the image Its dimensions make it a means of communication and transfer of ideas and meanings between the peoples of the world, and it also allows the inclusion of digital advertising content using multimedia with a degree of professionalism in other social networks, which allowed the various segments of society the opportunity to invest this network in their businesses of differen

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Adaptive Medical Image Watermarking Technique based on Wavelet Transform
...Show More Authors

In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Mathematical Model of Effect of Number of Pulses of Pulsed Laser on Formation Process of Plasma
...Show More Authors

The effect of number of pulses of pulsed laser on materials is studied analytically, different pulses has been used with the same delay time.  The depth of possible damage to the surface of copper and titanium as well as depth of the crater to both materials were considered in this study.  The study revealed that linear model is only possible when estimating depth of possible damage for copper material, this means that the depth of possible damage increases with the increment of number of laser pulses .As for titanium material, it is found  the relationship is nonlinear.  The depth of possible damage of titanium and copper is not the same, and copper seems to be more predictable than titanium.  
 

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Prediction of Coefficient of Permeability of Unsaturated Soil
...Show More Authors

A simple technique is proposed in this paper for estimating the coefficient of permeability of an unsaturated soil based on physical properties of soils that include grain size analysis, degree of saturation or water content, and porosity of the soil. The proposed method requires the soil-water characteristic curve for the prediction of the coefficient of permeability as most of the conventional methods. A procedure is proposed to define the hydraulic conductivity function from the soil water characteristic curve which is measured by the filter paper method. Fitting methods are applied through the program (SoilVision), after indentifying the basic properties of the soil such as Attereberg limits, specific gravity, void ratio, porosity, d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
Measurement of Appreciation of Clothes of University’s Students
...Show More Authors

Clothes are considered a means of aesthetic and artistic expression that help to hide the flaws of the body and highlight its merits , it has importance in people's lives as it reflects the individual's idea of himself and his personality. Whereas  the appreciation  in clothing  is a reflection of a person's sense of artistic components and the application of this sense to the clothes of his choice. Regarding the differences in clothing tastes by the university students according to the following variables (gender, specialization, stage of study,  age, monthly income), the current research is considered quantitative descriptive research that is concerned with studying a phenomenon that exists in reality, measuring it

... Show More
View Publication Preview PDF