Preferred Language
Articles
/
6hhATJYBVTCNdQwCUoLn
Domain names between legal regulation and lack of treatment
...Show More Authors

Throughout the ages,the methods of human production, exchange, and communication have not changed,and lifestyles have not witnessed rapid and comprehensive changes except since the presence of advanced and modern technologies for information and communication, which led to the emergence of new patterns of intellectual works and innovations that are dealt with and circulated through the virtual medium.These innovations are in many legal disputes, and domain names are one of the most important foundations of information networks, as they are the key to entering the virtual world and distinguishing websites. Because of the novelty of domain names,many attacks have occurred on them, which are closely related to intellectual property rights. And due to the inadequacy of national legislation To protect them,domain names need to be protected in the digital environment from the risks of attack and violation.

Publication Date
Sun Dec 01 2013
Journal Name
Political Sciences Journal
The legal provisions of the continental shelf in international law
...Show More Authors

الأحكام القانونية للجرف القاري في القانون الدولي

View Publication Preview PDF
Crossref
Publication Date
Thu May 14 2026
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Thu Dec 01 2016
Journal Name
2016 Ieee Symposium Series On Computational Intelligence (ssci)
A fusion of time-domain descriptors for improved myoelectric hand control
...Show More Authors

View Publication
Scopus (40)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Nondestructive Evaluation of Coatings Delamination Using Microwave Time Domain Reflectometry Technique
...Show More Authors

View Publication
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effects of Spontaneous Abortion on Women's Psychological Domain of Quality of Life
...Show More Authors

Objective: To find out the association between psychological domain of Quality of life with study variable
(demographic &reproductive).
Methodology: A descriptive Analytical study was conduct on Non-probability (purposive sample)of (200) women
who have suffering from spontaneous abortion in maternity unit from four hospitals which include Al-Elwyia
maternity teaching hospital, and Baghdad teaching hospital at Al-Russafa sector. Al –karekh maternity hospital
and Al-Yarmook teaching hospital at Al-karekh sector. A questionnaire was used as a tool of data collection for the
period of February 3rd 2013 to April 26th 2013 and consisted of four parts, including demographic, reproductive
characteristics, and psycholog

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 30 2012
Journal Name
College Of Islamic Sciences
Private legal defense push Al-Sael in Islamic jurisprudence
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our Prophet Muhammad and his family and companions. And after:
     For one of the greatest blessings of God Almighty upon us is the blessing of Islam, which brought people from darkness to light and from injustice and fear to security, justice, stability, and the preservation of blood, symptoms, rights, and sacrifices, because pride, strength, and dignity are what God chose and pleases His servants - namely - adherence to the Islamic religion, and in light of This must be said that the private legal defense (pushing the person) with its Islamic provisions and legislations is one of the great aspects that guarantees the establishment of a safe

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
The Iraqi Postgraduate Medical Journal
Comparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital
...Show More Authors

Comparative Study Between Glimepiride and Glibenclamide in the Treatment of Type 2 Diabetic Patients in Al-Yarmouk Hospital

View Publication