Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
Back ground: The innervations of the pineal
gland from the superior cervical ganglion have
shown some form of a chromatolysis reaction.
Objective:
1-Tracing the innervations of the pineal gland by
removing the target tissue (the pineal gland in
this study) i.e. (pinealoctomy) and removal of the
superior cervical ganglion i.e. (ganglionectomy).
2- The localization and total number of the
neurons which project into the rat pineal gland
3-The effect of pinealoctomy on the SCG after a
different time interval.
Methods: Twenty five albino rats were used in
this study, Pinealoctomy was done, then after a
different time interval ganglionectomy was done,
in order to study the Chromatolysis in their cel
A total of 70 pregnant women with toxoplasmosis were studied to evaluate of some immunological aspects. The women were distributed into three groups: 37 women were IgG positive, 18 women were IgM positive and 15 women were IgG and IgM positive as well as 25 healthy women were considered as control group. Serum samples were collected and ELISA method was employed to assess levels of interleukins 4, 6, 10, Interferon gamma-induced protein 10 (IP-10), Granulocyte-macrophage colony-stimulating factor (GM-CSF) and Vascular endothelial growth factor (VEGF). As compared with control the levels of cytokines were significantly increased in serum of three pregnant women groups with toxoplasmosis and the highest increase was observed in the IgM positi
... Show MoreThe study is done in the period between (February 20 and October 20) by using ten adult quail Coturnix coturnix (Linnaeus, 1758). The sections are preparing by paraffin method then stain in Harris haematoxylin-eosin. The histological aspects of spinal cord in quail (Coturnix coturnix) the white matter is in the outer part, while the gray matter is arranged in from of X represents its internal part, the dorsal region is called the dorsal horns while the ventral region is called the ventral horns and the central canal cavity, the spinal cord areas appeared as follows: The medial column, column of von Lenhossek, lateral column, dorsal magnocellular column and marginal paragriseal, columns are also called Hoffmann’s nuclei.
Targeted this study underlined the importance of the adoption of international accounting standards and their impact on the process of tax for settlements to achieve taxation justice the application on a sample of foreign banks investing in the local environment in order to achieve many of the objectives:
- Definition of the concept of justice for settlements taxation.
- To identify the impact of adopting international accounting standards in achieving the justice for settlements taxation.
- To determine the impact of the adoption of international accounting standards in attracting foreign investment.
They are summed up the problem of the study in the light of the nature of the problem and que
... Show MoreThe research aims at introducing accountability creative and the factors influencing or helping to Do in Iraqi companies, was launched two assumptions first that he was effect with significance to a number of factors in the direction of departments in Iraqi companies to practice creative accounting , were selected (9) factors believed to researchers it's most influential, and second that there importance of significance for a number of ways or methods to prevent or combat creative accounting , and the purpose of testing hypotheses have been designed questionnaire was distributed to a sample of 48 individual practitioners accountable in Iraqi companies and auditors in charge of auditing the accounts of those companies , after anal
... Show MoreThe general crisis of research methods in the social sciences
Research methodology: philosophy and techniques, founded by philosophers and applied by scientists, and no accurate application of techniques except with a deep understanding of philosophy, as a prerequisite. This fact is almost completely absent from the Iraqi and Arab academic mentality. This constituted one of the dimensions of the double crisis - theoretical and applied - of research methods in the social sciences. As first, there is no philosophy of science, neither as an independent material nor as an introductory subject, but not even an oral confirmation. Secondly, the advancement of quantitative research methods are presented without a background philosophy, as sol
Objective(s): The study aims to identify the role of sociodemographic factors in predicting the level of psychological hardiness of nurses.
Methodology: A descriptive correlational study conducted in the Medical City hospitals in the city of Baghdad during the period from November 1, 2022 to May 1, 2023 on a sample of 156 male and female nurses. The validity of the quest
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show More