Preferred Language
Articles
/
5xeaNo8BVTCNdQwCVWLC
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.

Crossref
View Publication
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improved High order Euler Method for Numerical Solution of Initial value Time- Lag Differential Equations
...Show More Authors

The goal of this paper is to expose a new numerical method for solving initial value time-lag of delay differential equations by employing a high order improving formula of Euler method known as third order Euler method. Stability condition is discussed in detail for the proposed technique. Finally some examples are illustrated to verify the validity, efficiency and accuracy of the method.

View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Open Newton Contes Formula for Solving Linear Voltera Integro-Differential Equation of the First Order
...Show More Authors

  In this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented.      The numerical solution of these equations is obtained by using Open Newton Cotes formula.      The Open Newton Cotes formula is applied to find the optimum solution for this equation.      The computer program is written in (MATLAB) language (version 6)

View Publication Preview PDF
Publication Date
Sun Sep 01 2024
Journal Name
Results In Engineering
Implementation of a control and monitoring system for a cathodic protection cell to mitigate localized corrosion in fixed and mobile steel structures
...Show More Authors

The current study introduces a novel technique to handle electrochemical localized corrosion in certain limited regions rather than applying comprehensive cathodic protection (CP) treatment. An impressed current cathodic protection cell (ICCPC) was fabricated and firmly installed on the middle of a steel structure surface to deter localized corrosion in fixed or mobile steel structures. The designed ICCPC comprises three essential parts: an anode, a cathode, and an artificial electrolyte. The latter was developed to mimic the function of the natural electrolyte in CP. A proportional-integrated-derivative (PID) controller was designed to stabilize this potential below the ICCPC at a cathodic potential of −850 mV, which is crucial for prote

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The supervisory role of the central bank in the protection of commercial banks: An applied research in the Economy Bank for Investment and Finance
...Show More Authors

Represents a supervisory and oversight role of the Central Bank  towards finding a sober banking sector, as the procedures , regulations and laws that the Central Bank insists on its implementation with the utmost precision, and that was to protect depositors and shareholders' class basis rights, but it is in the interest of the bank in the end, as it seeks to improve the performance of commercial banks and vaccinated against falling into the blunders, they also contribute to building a sober and stable banking sector and security contributes to the welfare and employment optimization of economic resources, and treatment of research (and the presence of banks decline in financial performance, according to financial performance indic

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (6)
Scopus
Publication Date
Sat Feb 12 2022
Journal Name
Engineering, Technology & Applied Science Research
Evaluating the Efficiency of Finance Methods in Residential Complex Projects in Iraq
...Show More Authors

Financial funding of a construction firm plays an important role in all aspects of the process development. It has been noted that financial crises have a direct impact on the construction industry. The Iraqi government, whether locally or globally, has faced a severe shortage of financing which has resulted in incomplete projects. Due to the financial crisis that Iraq went through which led to the suspension of many residential complex projects and the difficulty of the use of public financing methods, we researched the private financing (public-private partnership) methods instead of public financing methods in residential complex projects implementation. This study verified the financial problems and the factors that relate to th

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Effectiveness Silence Select in Iraqis Theatre Actor
...Show More Authors

The philosophies don’t forgets the subject silence because it effecting in life human , the kinds artist don’t lost the silence , exactly the theatrical arts because if the actor don’t the select silence he is don’t effect in the audience , this study giving the important for active the select silence in Iraqis theatre , so this search composed of : the preface that composed of : the search problem , and important the search and need it , aimed the search , lines search it composed of the lines time , lines place , and lines subject , and the terms limited . the theatrical line that composed The second topic the first topic the silence in the philosophers, part , active the select silence in the theatre text. The Third topic acti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF