Preferred Language
Articles
/
NhZCZIkBVTCNdQwCYomC
Legal Protection of Computer Programs
...Show More Authors

Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.

Crossref
Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Research and Development Programs Effectiveness in the Central Library of Baghdad University
...Show More Authors

Research and Development Programs Effectiveness in the Central Library of Baghdad University

View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
Journal Of Current Medical Research And Opinion
Effect of Educational Programs on MothersKnowledge and Childrens Nutritional Status: Narrative Review
...Show More Authors

Publication Date
Thu Mar 01 2018
Journal Name
دراسات عربية في التربية وعلم النفس
تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة وفقاً لعمليات العلم
...Show More Authors

يهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لعمليات العلم عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر عمليات العلم في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة المعتمدان من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2016-2017) م؟ اعتمد هذا البحث المنهج الوصفي التحليلي، وتضمن مجتمع البحث وعينته محتوى كتابي الحاسوب المقررين لطلبة الصفين

... Show More
Publication Date
Tue Jul 01 2008
Journal Name
Journal Of Educational And Psychological Researches
الظواهر السلوكية غير المرغوب فيها لدى مستخدمي الحاسوب والإنترنت
...Show More Authors

أهمية البحث والحاجة إليه:

          من مظاهر التواصل الحضاري في جانبه العلمي والتكنولوجي هو متابعة أبناء مجتمعنا ولاسيما الشباب لكل منجز حديث واتخاذه وسيلة للحصول على المعلومات والمعرفة والتسلية، بحيث أصبح هذا التعامل ممارسة يومية حياتية، وهذا دليل على مدى تفتح ذهنية وعقلية ورغبات أبنائنا ومواكبتهم لروح العصر ومتطلباته وتعبيراً صادقاً عنه فضلاً عن إشغال أوقات ف

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The effective role of computer information systems in the tax assessment process
...Show More Authors

The objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Computer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Computer Literacy with Skills of Seeking for Information Electronically among University Students
...Show More Authors

Publication Date
Thu Jun 01 2023
Journal Name
Advances In Mechanical Engineering
3D-shape formation of blood vessels based on computer aided design system
...Show More Authors

This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 26 2017
Journal Name
Journal Of Engineering
Cathodic Protection Design Algorithms for Refineries Aboveground Storage Tanks
...Show More Authors

Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.

Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int

... Show More
View Publication Preview PDF