Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
Of the many functions that are performed by the drilling fluid, the most important is to transport cuttings from the bit up the annulus to the surface. Various drilling fluid have been widely used in the oil industry to improve lifting capacity. In this study, three mud type have been used which they are, oil base mud, X-anthan polymer and a mixture of CMC and bentonite ,by using Carrying Capacity Index calculation (CCI) , the Xanthan gave good values of CCI than other studied drilling fluid. By using Sifferman chart and field data from well in south of Iraq and API equation to find cutting concentration in the annulus, The results showed that the used of thick mud increase the lifting capacity and decrease volumetric drill c
... Show MoreLeishmania is the causative agent of leishmaniasis, a widely distributed disease. Amastigote forms of Leishmania are intracellular and reside within the macrophage of the vertebrate host. Previous studies showed that certain Leishmania species may scavenge host factors for survival, specially sphingolipids, the key element of the eukaryotic membranes. In this study we have investigated the survival of new world L. mexicana amastigotes in murine macrophage cell-line in the presence and absence of foetal bovine serum (FBS). Results showed that there was no significance in the infectivity of amastigotes and also the number of parasite per cell; such findings suggest that L. mexicana amastigotes have its own pathway of sphingolipid intake and c
... Show MoreIn this research a study process to calculate the factor accumulation of gamma rays for aluminum and exporters cobalt 60 Mika Atktron volts and actively radiation Vdrh 1.406 Mika Bq been studying the effect of the angle of reimbursement and the distance between the shield and detector In measurements factor accumulation Adhrt results in line with the theoretical results published
The current research aims to measure the impact of the skills of human resources management professionals in information technology in Iraqi private banks, as the skills of human resources management professionals constitute the modern trend of banks' interest in employees with outstanding performance, and the presence of information technology in banks is a prerequisite for dealing with the huge amount of data. And converting it into information to support the decision-maker in light of a complex environment, and the field research problem was the presence of a clear lack of interest in the skills of human resource management professionals and the weak adoption of information technology, which was reflected negatively on the compet
... Show MoreFever is a common illness in the pediatric age group ,the causes could be viral ,bacterial and fungal , this study was focused on bacterial pathogens as gram positive like Staphylococci, coagulase positive or negative ,Streptococci and gram negative like E-coli , Klebsialla ,Proteus, Pseudomonas, Burkhoderia , Acinetobacter and others like Pusturella ,E-alkalescendiaper, Haemophillus influenza and yeast like candida . Four thousand and seventy eight blood samples (4078)were collected in a period between January 2011 and the end of May 2012 at the child welfare hospital ,all the samples were cultured on suitable culture media and then biochemical tests were done using API-E 20 and sugar fermentation tests ,sensitivity
... Show MoreReading is an interactive process that goes on between the reader and the text, resulting in comprehension. The text presents letters, words, sentences, and paragraphs that encode meaning. The reader uses knowledge, skills, and strategies to determine what that meaning is. Reading comprehension is much more than decoding; it results when the reader knows which skills and strategies are appropriate for the type oftext, and understands how to apply them to accomplish the reading purpose.Reading comprehension is important because without it reading is nothing more than tracking symbols on a page with your eyes and sounding them out leaving the reader with no information. Instead of promoting traditional approaches, reading should be taught
... Show Moredance that reflect deferent sides from life human , in this search ensure for the causation can the expressionistic dancing be development acting actor in Iraqis theatre ? so this search concept of section one composed of the search problem , and important the search and need it , aimed the search , lines search it composed of the lines time , place , and lines subject , and the searcher ended this section with practical terms . Section tow – theatrical lines form that composed of part one the dance kinds: the expressionistic dancing, is very important in analyses the symbol .
... Show MoreFacial recognition has been an active field of imaging science. With the recent progresses in computer vision development, it is extensively applied in various areas, especially in law enforcement and security. Human face is a viable biometric that could be effectively used in both identification and verification. Thus far, regardless of a facial model and relevant metrics employed, its main shortcoming is that it requires a facial image, against which comparison is made. Therefore, closed circuit televisions and a facial database are always needed in an operational system. For the last few decades, unfortunately, we have experienced an emergence of asymmetric warfare, where acts of terrorism are often committed in secluded area with no
... Show More