Preferred Language
Articles
/
5xeaNo8BVTCNdQwCVWLC
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.

Crossref
View Publication
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Role of Balanced Scorecard in Evaluating Total Productive Maintenance Performance
...Show More Authors

              In light of the general inadequacy in the performance of the economic units operating in Iraq, and the contemporary developments in all the various sciences, Iraqi economic units have become obligated to use modern technologies applied around the world. Keeping abreast of these developments is done by moving away from traditional methods of evaluating performance and applying approved and accepted methods of evaluating performance. This will lead to an increase in the efficiency and effectiveness of the activities of economic units. In addition, this drives to reduce production costs. Accordingly, this study aims to clarify the application of the balanced scor

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Evaluating the Science Experts Program at the Specialized Institute for Professional Training for Teachers in the Sultanate of Oman in Light of the Kirkpatrick Model
...Show More Authors

Abstract

This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the E-learning system, to identify the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in the governmental schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire containing four different feedback patterns: reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the questionnaire were verified in terms of validity

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Modified Strut Effectiveness Factor for FRP-Reinforced Concrete Deep Beams
...Show More Authors

A few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed util

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Thu Jan 01 2026
Journal Name
Al–bahith Al–a'alami
Legal Protection of the Printing Format of the Newspaper
...Show More Authors

This research has been devoted to the objective and important issue which is the legal protection of the printing form of the newspaper in the Iraqi press.

As this issue constitutes the integrated unit of the printing format in addition to achieving legal protection for the illustrative image used in the press. Such matter, on both level the integrated unit of the printing format and the legal protection, is out of reach of study due to the comprehension of the subject is concerned.

Although there is a justification for dealing with both of them together as the explanatory image is one of the foundations on which the printing format of the newspaper is built. This case generates, at least, the same legal subject that appe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The supervisory role of the central bank in the protection of commercial banks: An applied research in the Economy Bank for Investment and Finance
...Show More Authors

Represents a supervisory and oversight role of the Central Bank  towards finding a sober banking sector, as the procedures , regulations and laws that the Central Bank insists on its implementation with the utmost precision, and that was to protect depositors and shareholders' class basis rights, but it is in the interest of the bank in the end, as it seeks to improve the performance of commercial banks and vaccinated against falling into the blunders, they also contribute to building a sober and stable banking sector and security contributes to the welfare and employment optimization of economic resources, and treatment of research (and the presence of banks decline in financial performance, according to financial performance indic

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

View Publication
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Evaluating Windows Vista user account security
...Show More Authors

In the current Windows version (Vista), as in all previous versions, creating a user account without setting a password is possible. For a personal PC this might be without too much risk, although it is not recommended, even by Microsoft itself. However, for business computers it is necessary to restrict access to the computers, starting with defining a different password for every user account. For the earlier versions of Windows, a lot of resources can be found giving advice how to construct passwords of user accounts. In some extent they contain remarks concerning the suitability of their solution for Windows Vista. But all these resources are not very precise about what kind of passwords the user must use. To assess the protection of pa

... Show More
View Publication Preview PDF
Crossref