Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the limitation of traditional AVs, we proposed a virus detection system based on extracting Application Program Interface (API) calls from virus behaviors. The proposed research uses static analysis of behavior-based detection mechanism without executing of software to detect viruses at user mod by using Markov Chain.
The research aims to determine the strength of the relationship between time management and work pressure and administrative leadership, where he was taken a sample of (47) of the administrative leadership at the Higher Institute of security and administrative development in the Ministry of Interior was used questionnaire as a key tool in collecting data and information and analyzed the answers to the sample surveyed by using Statistical program (spss) in the arithmetic mean of the calculation and test (t) and the correlation coefficient, the research found the most important results: the existence of significant moral positive relationship between both time management and work pressure and administrative leadership, the leadership of th
... Show MoreA square experimental arena with vegetation on one interior side was deployed in a Sharjah, United Arab Emirates desert. Individual darkling beetles (Coleoptera, Tenebrionidae) Akis subtricostata Redtenbacher, 1850 and Trachyderma philistina Reiche and Saulcy, 1857 were placed inside the arena at temperatures ranging between 27 - 49°C. Whether they chose the vegetated side of the arena or not was recorded, as well as how long it took for them to reach the vegetated side, if they chose it. Both species preferred the vegetated side at all temperatures, and the chance of them choosing the vegetated side increased significantly with increasing temperature (logistic regression, p = 0.0096 and p = 0.0003 for
... Show More<em>The aim of the research is to set a set of BioKinematic variables for the step of crossing barriers (3–6–9) in a 110-meter barrier for young runners. The researchers concluded the study by interpreting and discussing the results that the most important variables must be relied upon when training and selecting runners that got the best saturation on their factors: 1-The first factor which refers to the total distance of the plan to pass the third barrier + the total distance of the plan to pass the ninth barrier + the total distance Plan to cross the sixth barrier. 2-The second factor which refers to the total vertical speed before passing the third barrier + the total vertical speed before the sixth barrier + the total vertica
... Show MoreOn of the direct causes which led to the global financial crisis 2008 is decrease or collapse in liquidity of large financial institutions which is reflected on investments of a considerable number of institutions and persons.
This study aim's through out its three sections to explain the disclosure level of financial institutions which affected by Financial Crisis from liquidity information which explained in the statement of cash flow according to Timeliness and Completeness.
The study concluded an important result the company of research sample was disclosure in Timeliness and Completeness from all of accounting information is related in liquidity or that related in result of operations and financial position. The more
... Show MoreNew series of 4, 4'-((2-(Aryl)-1H-benzo [d] imidazole-1, 3 (2H)-diyl) bis (methylene)) Diphenol (3a-g) was successfully synthesized from cyclization of the reduction product of bis Schiff bases (2) with aryl aldehydes bearing phenolic hydroxyl in the presence of acetic acid. The structure of these compounds was identified from FT-IR, 1H NMR, 13C NMR and EIMs. The Antioxidant capability was screened by DPPH and FRAP assays. Both assays showed antioxidant capability more than BHT as well. Compounds 3b and 3c showed antioxidant capacity slightly less than ascorbic acid. The docking study for theses compound was carried out as III DNA polymerase inhibitor. The results of docking demonstrated that the increase in hinderances around phenolic hydr
... Show MoreRKASFH Ghanim, Ibn Al -Haitham Journal for pure and applied science, 2017
The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and
... Show MoreThis study relates to the estimation of a simultaneous equations system for the Tobit model where the dependent variables ( ) are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method and Two- Stage limited dependent variables(2SLDV) method to get of estimators that hold characteristics the good estimator .
That is , parameters will be estim
... Show More