Preferred Language
Articles
/
jcoeduw-774
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for proposed combining method.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 21 2026
Journal Name
Imam Ja'afar Al-sadiq University Journal Of Legal Studies
The legal framework for the protection of new plant varieties
...Show More Authors

TRIPS agreement was The first to apply protection by patents. However, this type of protection, which grants exclusive and monopoly rights to patent owners, came at the expense of developing countries which are considered rich in biodiversity and also at the expense of traditional and poor knowledge of modern technologies. The release of new plant varieties has led to the emergence of biopiracy and looting of the rights of developing countries without a license

View Publication
Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Performance evaluation of the Iraq Stock Exchange market under the financial losses of terrorism for the years 2010-2015
...Show More Authors

The Research topic seeks to analyze the "political risk and its component Terrorism Index," which consists of five indicators index, a number of terrorist operations, and the number of dead and wounded, and the size of the physical losses, based search sub-index analysis of material losses for the index terrorism and its impact on the indicators listed on the Iraq Stock Exchange Finance. As for the practical side, it has been use style gradient unrestricted and link the sample represented by ten banks listed on the Iraq Stock Exchange. was Statement the correlation and interaction of variables of the studySearch results produced that the volume of material losses is the most important indicator in the influential force and it explain a v

... Show More
View Publication
Crossref
Publication Date
Wed Feb 01 2012
Journal Name
Ibn Al-haytham Journal For Pure And Applied Science
Using Restricted Least Squares Method to Estimate and Analyze the Cobb-Douglas Production Function with Applicatio
...Show More Authors

Publication Date
Tue Mar 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Semi-parametric regression function estimation for environmental pollution with measurement error using artificial flower pollination algorithm
...Show More Authors

Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin

... Show More
Publication Date
Fri Jun 01 2012
Journal Name
J Med J
Relationship of seminal biochemical parameters and serum reproductive hormones with sperm function tests in asthenospermic patients
...Show More Authors

Aim: The aim of this study is to determine the correlation between levels of certain seminal biochemical parameters and serum reproductive hormones, on the one hand, and sperm function tests, on the other hand, in asthenospermic patients. Patients and Methods: Sixty asthenospermic patients and twenty fertile men as a control group were included in this study. Semen samples were collected to perform seminal fluid analysis. Total protein, cholesterol, calcium, creatine kinase, and fructose were measured in the seminal plasma. Blood samples were collected for hormonal assay of serum reproductive hormones: testosterone, prolactin, luteinizing hormone, and follicle-stimulating hormone. Results: The results revealed a significant positive correla

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Apr 01 2021
Journal Name
Biochemical And Cellular Archives
STUDY OF LYSYL OXIDASE-1 AND KIDNEY FUNCTION IN SERA OF IRAQI PATIENTS WITH DIABETIC NEPHROPATHY
...Show More Authors

This study aimed to compare lysyl oxidase-1 level in diabetic patients with and without renal dysfunction, that LOX-1 may be an indicator for the early stage of diabetic nephropathy (DN). In addition to finding it is a relationship with kidney functions in Iraqi diabetic patients with and without renal dysfunction. Blood was obtained from 25 healthy individuals as a control group (G1), 25 diabetic patients with renal dysfunction, and 25 diabetic patients without renal dysfunction. Age range 40-60 years for all subjects. BMI (25-27) Kg/m2 . The serum was used for the analysis of LOX-1, FBG, urea, creatinine and uric acid. Whole blood is used for the determination of HbA1C. Results of FBG and HbA1C revealed a significant increase in G2 and G

... Show More
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayes Estimators With others , for scale parameter and Reliability function of two parameters Frechet distribution
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Differential Equations And Dynamical Systems
Stability and Bifurcation in a Prey–Predator–Scavenger System with Michaelis–Menten Type of Harvesting Function
...Show More Authors

View Publication
Scopus (32)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة
دور استراتيجية الانتاج الانظف في حماية البيئة وتخفيض التكاليف
...Show More Authors

ان حماية البيئة وتخفيض التكاليف من األهداف التي تسعى الوحدات االقتصادية الى تحقيقها لكي تتماشى مع التوجه العالمي لحماية الموارد الطبيعية وإنتاج منتجات صديقة للبيئة وفي الوقت نفسه التخلص من االلتزامات التي تتحملها الوحدات االقتصادية من تكاليف بيئية وغر امات مما يؤدي الى ارتفاع كلف االنتاج ، يهدف البحث الى دراسة المرتكزات المعرفية الستراتيجية اإلنتاج األنظف وتحديد التكاليف التي يمكن تخفيضها خالل مراحل اا

... Show More