Preferred Language
Articles
/
5xeaNo8BVTCNdQwCVWLC
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.

Crossref
View Publication
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION: PROMOTE HUMAN RIGHTS IN CONSUMER PROTECTION AGAINST ENVIRONMENTAL, HEALTH, LEGAL, ADMINISTRATIVE AND CORRUPTION
...Show More Authors

Consumer protection requires seeking one official entity to accomplish its tasks. The large number of devices control and implementation in it, return to several ministries, and executive bodies lose coordination and cooperation, and unite efforts to eliminate the types of fraud and control the quality of production within the approved standards. This is in addition to the seriousness of the existence of administrative and legal corruption which hinders the role of inspection committees and representatives of official bodies with the relationship and prevents them from carrying out their duties entrusted to them or presenting them with administrative complications to thwart their duties in consumer protection. This is despite the

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 19 2025
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the Observing Internal System in the General State of Taxes and its Role in Increasing the Taxes Revenue
...Show More Authors

The internal observing system is considered a cornerstone for the high management in all the systems. It aims at defending the things for waste and increasing efficient and application the rules and regulations and constrictions. To easier for the high management activity in the internal observing system which in presented and practiced and to what extent can depend on it. Thus it goes to evaluate the internal observing system periodically to check the weak points in that system so as the find out the mistake, in the construction of the system or mistake, by indication of the workers. The importance of this study is represented in the need of increasing the coactivity in the internal observing system so as to be in touch with the new tre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 19 2025
Journal Name
Al.qadisiya Journal For The Sciences Of Physical Education
The Impact of weighted gloves on developing the effectiveness of performance and increasing the number of punches for youth boxers
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE ROLE OF SPECIFIC AMINO ACIDS IN THE PROTECTION OF E. COLI AGAINST B-LACTAM ANTIBIOTICS IN VITRO
...Show More Authors

The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro In minimal medium, cells were treated with 32 ug/ml of penicillin G, carbenciLlin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementation. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and sephalotin. Deletion of methionine or asparagine abolished the protection against carbencillin and to a less extent cephalotin.

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 11 1989
Journal Name
مجلة متحف التاريخ الطبيعي
The Role of Specific Amino Acids in the Protection of Escherichia coli Against B-Lactam Antibiotics In Vitro
...Show More Authors

ABSTRACT The role of specific amino acids namely cysteine, methionine, threonine and asparagine in the protection provided by vamin solution against B-lactam inhibition to E. coli was evaluated in vitro. In minimal medium, Cells were treated with 32 ug/ml of penicillin G, carbencillin, hostacillin, cloxacillin and cephalotin in the presence of specific amino acid supplementations. Deletion of specific amino acids from the media abolished the protection provided by vamin. Threonine was essential for the protection of cells against all tested antibiotics, while cysteine was essential for protection against carbencillin and cephalotin Deletion of methionine or asparagine abolished the protec- tion against carbencillin and to a less extent ce

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Nov 29 2020
Journal Name
Iraqi Journal Of Science
Protection Effects of Vernonia Amygdalina Methanolic Extracts Against Hepatocellular Damage Induced by Petroleum Contaminated Diets in Male Rats
...Show More Authors

Recently, bitter leaf (Vernonia amygdalina) was found to prevent petroleum – induced toxicities on the kidney whereas it potentiates the toxic effect of petroleum adulterated diet on the testes of animal model. This differential action has elicited further inquest into the role of bitter leaf extract in other organs in the midst of petroleum affronts. The hepatoprotective ability of Vernonia amygdalina methanol extract (VAME) is the objective of this investigation.  Administration of VAME significantly (P <0.05) reduced serum liver function indices relative to the control. In addition, the activities of liver oxidative enzymes, energy metabolizing enzymes and oxidative stress indices altered by crude oil

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Risalat Al-huquq Journal
Legal protection for producers of phonograms in Iraqi law
...Show More Authors

Piracy on phonograms is now, rightly, the crime of the electronic age. Despite the protection sought by States to provide for such registrations, whether at the level of national legislation or international agreements and conventions, but piracy has been and continues to pose a significant threat to the rights of the producers of those recordings, especially as it is a profitable way for hackers to get a lot of money in a way Illegal, which is contrary to the rules of legitimate competition. Hence, this research highlights the legal protection of producers of phonograms in light of the Iraqi Copyright Protection Act No. (3) of 1971, as amended.

View Publication