Computer programs are one of the most prominent features of technical progress in the field of information technology, which has raised many new issues that have not existed since the mid-twentieth century. and controls on the use of these programs by third parties, Controversy still exists about the legal nature of computer programs between those who believe that they are subject to the laws of patents and industrial property, and those who believe that they are subject to the laws of copyright protection and literary and artistic property, and the resulting difference in the scope of protection and rights established according to the legal system adopted in the application. This study comes to shed light on the legal nature of computer programs and to indicate the legal conditions that are required to be covered by protection.
Research and Development Programs Effectiveness in the Central Library of Baghdad University
يهدف هذا البحث إلى تحليل محتوى كتابي الحاسوب للمرحلة المتوسطة في العراق وفقاً لعمليات العلم عن طريق الإجابة عن السؤال الآتي: ما نسبة توافر عمليات العلم في محتوى كتابي الحاسوب المقرران على طلبة المرحلة المتوسطة المعتمدان من وزارة التربية العراقية/ المديرية العامة للمناهج في العام الدراسي ( 2016-2017) م؟ اعتمد هذا البحث المنهج الوصفي التحليلي، وتضمن مجتمع البحث وعينته محتوى كتابي الحاسوب المقررين لطلبة الصفين
... Show Moreأهمية البحث والحاجة إليه:
من مظاهر التواصل الحضاري في جانبه العلمي والتكنولوجي هو متابعة أبناء مجتمعنا ولاسيما الشباب لكل منجز حديث واتخاذه وسيلة للحصول على المعلومات والمعرفة والتسلية، بحيث أصبح هذا التعامل ممارسة يومية حياتية، وهذا دليل على مدى تفتح ذهنية وعقلية ورغبات أبنائنا ومواكبتهم لروح العصر ومتطلباته وتعبيراً صادقاً عنه فضلاً عن إشغال أوقات ف
... Show MoreThe objective of this study is to enable the role of modern and advanced computerized information systems. The model or mechanism should be developed by collecting the necessary information about the taxpayers and the sources of the taxpayers' income, on the basis of which the accuracy of the inventory process will be adopted. In addition to studies related to computerized information systems and showing their importance to the tax institution. To achieve the objectives of the study and to answer its questions, the researcher relied on collecting data and information on the subject on the literature and previous studies The secondary sources, which also formed the theoretical framework of the study, were obtained either as a practical fr
... Show MoreComputer literacy is an urgent necessity for university students, given the rapid development in the means of communication in which we live in this era, and the flow of abundant information. Mainly on the computer in all administrative and academic transactions, where first of all the registration for the semester is done through the computer. Computer culture has many characteristics and advantages that distinguish it from other sciences, including the concept of computer culture that cannot be defined absolutely, and it is difficult to define its levels, because the specifications of the computer-educated individual differ from one individual to another, and from time to time also, you find it a luxury in a country What, and you
... Show MoreThis paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Storage tanks condition and integrity is maintained by joint application of coating and cathodic protection. Iraq southern region rich in oil and petroleum product refineries need and use plenty of aboveground storage tanks. Iraq went through conflicts over the past thirty five years resulting in holding the oil industry infrastructure behind regarding maintenance and modernization. The primary concern in this work is the design and implementation of cathodic protection systems for the aboveground storage tanks farm in the oil industry.
Storage tank external base area and tank internal surface area are to be protected against corrosion using impressed current and sacrificial anode cathodic protection systems. Int
... Show More