Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
Addressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreAn experimental investigation based on thirty three simple pullout cylinder specimens was conducted to study the bond-slip trend between concrete and steel reinforcement. Plain and deformed steel reinforcement bars were used in this investigation. The effect of bar diameter, concrete compressive strength and development length on bond-slip relation was detected. The results showed that the bond strength increases with increasing of compressive strength and with decreasing of bar diameter and development length. A nonlinear regression analysis for the experimental results yields in a mathematical correlation to predict the bond strength as a function of concrete compressive strength, reinforcing bar diameter and its yield stress. The minimum
... Show MoreEvery cultural achievement is a creative text, and every text is a group of signs. The Winged Bull sculpture is a sort of text that is not confined to some signs; indeed, its cultural signs go far beyond as they are open-ended, everlasting and it lends itself to various horizons of interpretation. The recipient has to combine the signs of this sculpture, which belong to different patterns, in the pursuit for perfection so that he can decode its media message.
I have tackled this sculpture by adopting a semiotic approach. The semiotic approach is a modern critical approach which is as wide as culture and as rich as knowledge. It has been linked to modernism, which in turn has been linked to modern critical approaches, because it can
Objectives: The demand for orthodontic treatment is nowadays increasing significantly for aesthetic improvement and to correct various kinds of malocclusion, yet the prolonged treatment time remains the main obstacle. This review aimed to demonstrate various orthodontic techniques and highlight the evidence-based successful approaches used for acceleration of orthodontic tooth movement. Materials and Methods: Data and sources of information pertaining to accelerated orthodontic tooth movement premised on English-written articles were searched using electronic databases including Google Scholar, Scopus, PubMed and MEDLINE. Results: This review demonstrated the availability of different surgical and non-surgical methods to enhance tooth movem
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreDBN Rashid, International Journal of Innovation, Creativity and Change, 2020
Background: The Epstein-Barr virus (EBV) relates to the torch virus family and is believed to have a substantial impact on mortality and perinatal events, as shown by epidemiological and viral studies. Moreover, there have been documented cases of EBV transmission occurring via the placenta. Nevertheless, the specific location of the EBV infection inside the placenta remains uncertain. Methods: The genomic sequences connected to the latent EBV gene and the levels of lytic EBV gene expression in placental chorionic villous cells are examined in this work. A total of 86 placentas from patients who had miscarriage and 54 placentas from individuals who had successful births were obtained for analysis. Results: The research employed QPCR to dete
... Show MoreTrigeminal Neuralgia (TN) is one of the most commonly painful cranial neuralgia characterized by paroxysmal attacks as short lasting facial pain along the trigeminal nerve branches. The aim of the present study is to innovate a biochemical relationship between (melatonin, GALNT12 and Zn) and TN and also to examine the biochemical action of tegretol (carbamazepine) as a treatment on the above biochemical parameters. Blood samples were collected from fifty four (54) trigeminal neuralgia patients diagnosed by magnetic radiation image (MRI). Patients were classified into four groups: G3 (40- 70) years composed of (12) diagnosed male (without treatment), G4 (48- 75) years composed of (12) diagnosed female (without treatment), G5 (34- 76)
... Show More