Preferred Language
Articles
/
-xape4cBVTCNdQwCNFM6
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the limitation of traditional AVs, we proposed a virus detection system based on extracting Application Program Interface (API) calls from virus behaviors. The proposed research uses static analysis of behavior-based detection mechanism without executing of software to detect viruses at user mod by using Markov Chain.

Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of structural concrete bar members based on secant stiffness methods
...Show More Authors

In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A comparison between numerical and experimental data, illustrated

... Show More
Scopus
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Multiwavelet and Estimation by Interpolation Analysis Based Hybrid Color Image Compression
...Show More Authors

Nowadays, still images are used everywhere in the digital world. The shortages of storage capacity and transmission bandwidth make efficient compression solutions essential. A revolutionary mathematics tool, wavelet transform, has already shown its power in image processing. The major topic of this paper, is improve the compresses of still images by Multiwavelet based on estimation the high Multiwavelet coefficients in high frequencies sub band  by interpolation instead of sending all Multiwavelet coefficients. When comparing the proposed approach with other compression methods Good result obtained

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 28 2021
Journal Name
2021 2nd Information Technology To Enhance E-learning And Other Application (it-ela)
Pedestrian and Objects Detection by Using Learning Complexity-Aware Cascades
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Wed May 01 2019
Journal Name
Iraqi Journal Of Biotechnology
Identification of Leishmania donovani Isolates by Polymerase Chain Reaction
...Show More Authors

Leishmaniasis is endemic ofIraq in both cutaneous and visceral form. The available tools for diagnosis and detection of Leishmaniaare nonspecific and may interfere with other species. In this study, Polymerase Chain Reaction (PCR) has been used to identify Iraqi isolate of visceral leishmaniasis (MHOM/ IQ/2005/MRU15) which a previously diagnosed by classical serological tests. PCR amplificationwas carried out using species-specific primers of Leishmania donovani. Four primer pairs of mini-circle DNA and ITS-1 were used.13A/13B, which is used to identify Leishmaniaas a genus, NM12, LITSR/L5.8S and BHUL18S, were used to detect the sub species of L. donovani.The result ofPCR

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 13 2020
Journal Name
Journal Of Physics: Conference Series
Chaos in Beddington–DeAngelis food chain model with fear
...Show More Authors
Abstract<p>In the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t</p> ... Show More
View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Sumer 1
Evaluation of the effects of Curcumin gel against Periodontopathic Bacteria (Porphyromonas gingivalis) using real-time time-polymerase chain reaction technology
...Show More Authors

Periodontal disease is typically treated with mechanical debridement of the tooth surface. It may, however, be insufficient to eradicate pathogenic microorganisms on its own. Because of the microbial etiology of periodontitis, systemic or local antibiotic therapy is used as an adjunct treatment. The present study aimed to determine the effects of curcumin gel on Porphyromonas gingivalis. Eleven patients with stage II and III periodontitis were registered in the study. A double-blinded split-mouth design followed. Periodontal pockets were distributed into 2 groups; the test group received scaling and root planing along with curcumin gel, while the control group received scaling and root planing along with a placebo gel. Plaque index,

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Study of the Static and Dynamic Nuclear Properties and Form Factors for Some Magnesium Isotopes 29-34 Mg
...Show More Authors

Nuclear structure of 29-34Mg isotopes toward neutron dripline have been investigated using shell model with Skyrme-Hartree–Fock calculations. In particular nuclear densities for proton, neutron, mass and charge densities with their corresponding rms radii, neutron skin thicknesses and inelastic electron scattering form factors are calculated for positive low-lying states. The deduced results are discussed for the transverse form factor and compared with the available experimental data. It has been confirmed that the combining shell model with Hartree-Fock mean field method with Skyrme interaction can accommodate very well the nuclear excitation properties and can reach a highly descriptive and predictive power when investiga

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Gas Lift Optimization for Zubair Oil Field Using Genetic Algorithm-Based Numerical Simulation: Feasibility Study
...Show More Authors

The gas-lift method is crucial for maintaining oil production, particularly from an established field when the natural energy of the reservoirs is depleted. To maximize oil production, a major field's gas injection rate must be distributed as efficiently as possible across its gas-lift network system. Common gas-lift optimization techniques may lose their effectiveness and become unable to replicate the gas-lift optimum in a large network system due to problems with multi-objective, multi-constrained & restricted gas injection rate distribution. The main objective of the research is to determine the possibility of using the genetic algorithm (GA) technique to achieve the optimum distribution for the continuous gas-lift injectio

... Show More
View Publication
Crossref (1)
Crossref