Preferred Language
Articles
/
5xeaNo8BVTCNdQwCVWLC
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.

Crossref
View Publication
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Design of New Dynamic Cryptosystem with High Software Protection
...Show More Authors

     In this paper a design of new robust and dynamic cryptosystem using stream key generator with good random statistical properties is introduced. The results of the statistical tests, initialization and the components of the proposed generator of the suggested cryptosystem are detailed in [1]. The proposed cryptosystem called Robust and Efficient Dynamic Stream Cipher Cryptosystem (RDSCC). The dynamic here means the generator of RDSCC has unfixed construction; the design will be changed as the seed (initial) key changed. The generator will construct itself by barrows number of Linear Feedback Shift Registers (LFSR’s), randomly, stored in protected bank file. The RDSCC is constructed to be flexibl

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 26 2021
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Review on Medical Child Abuse and Child Protection
...Show More Authors

Background

Medical child abuse describes a child receiving unnecessary, harmful, or potentially harmful medical care at the caretaker's instigation.

Objectives

To focus on medical child abuse as an entity and emphasize its epidemiology, clinical presentations, prevention, and management.

Results

In the UK, the annual incidence of medical child abuse in children below one year increased to 3:100,000, while its prevalence in Arabs, including Iraq, is ambiguous due to lack of evidence and improper clinician's awareness. The mean age at diagnosis is 14 months to 2.7 years. Female caregivers are the most common offenders. Clinically, medical child abuse

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 22 2024
Journal Name
Al–bahith Al–a'alami
Legal Protection of the Printing Format of the Newspaper
...Show More Authors

This research has been devoted to the objective and important issue which is the legal protection of the printing form of the newspaper in the Iraqi press.

As this issue constitutes the integrated unit of the printing format in addition to achieving legal protection for the illustrative image used in the press. Such matter, on both level the integrated unit of the printing format and the legal protection, is out of reach of study due to the comprehension of the subject is concerned.

Although there is a justification for dealing with both of them together as the explanatory image is one of the foundations on which the printing format of the newspaper is built. This case generates, at least, the same legal subject that appe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Educational And Psychological Researches
Effectiveness of cooperative learning in at the implementation of floral material for celli graph and decoration
...Show More Authors

The purpose of this resesrh know (the effectiveness of cooperative lerarning implementation of floral material for calligraphy and ornamentation) To achieve the aim of the research scholar put the two zeros hypotheses: in light of the findings of the present research the researcher concluded a number of conclusions, including: -
1 - Sum strategy helps the learner to be positive in all the information and regulations, monitoring and evaluation during the learning process.
2 - This strategy helps the learner to use information and knowledge and their use in various educational positions, and to achieve better education to increase its ability to develop thinking skills and positive trends towards the article.
In light of this, the

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
The Relationship Between Solar Indices and Electron Density of D- Region over Baghdad City During the Ascending and the Descending Phases of Solar Cycle 23
...Show More Authors

This research dedicated to make an investigation for the variation of electron density concentration of D- region(NmD), at a characteristic height of 81 km throughout solar cycle 23, with solar activity(represented by sunspot number indices: international sunspot number(Ri), Northern hemisphere sunspot number(Rn) and Southern hemisphere sunspot number(Rs), as well as, the correlation between these indices for Baghdad city(lat.: 33.3o N, long.: 44.4o E) at local noon time during the ascending and the descending phases of solar cycle 23. A very strong directly relationship were found between Ri, Rn and Rs with NmD, as well as, the correlation coefficient between these parameters have been calculated and it has been found it is equal, i.e.,

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Sciences Journal Of Physical Education
Use different means rehabilitative according some bio-kinematics variables and their impact on increasing range of motion for people with shoulder joint
...Show More Authors

View Publication
Publication Date
Sun Oct 02 2016
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Evaluation of Ionizing Radiation Protection among Radiation Workers in X-ray departments in Erbil City
...Show More Authors

Background: Ionizing radiations are hazardous agents in the workplace, since all forms of ionizing radiation produce some type of injury that is incurable. Therefore, protection against ionizing radiation exposure can play an important role in the health of workers.
Objectives: is to evaluate the application of radiation protection among radiation workers at X-ray department in Erbil hospitals.
Patients and methods: Six hospitals (General and Private) were visited. Samples of 110 were randomly selected among 135 radiation workers, 47 (42.3%) female and 63 (57.3%) male Data was collected through structured questionnaires. The surveyed data was coded and analyzed by using MS Excel software, and SPSS 18 f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 07 2021
Journal Name
Journal Of Legal Sciences
The role of constitutional judiciary in the protection of academic freedom in Iraq: Comparative study
...Show More Authors

Academic freedom is a human right, and if human rights are general rights, academic freedom is a special freedom for members of the academic community. Despite the modernity of the term "academic freedom", its content was not the result of the contemporary state of scientific academic bodies, That the development of the importance of this term coincided with the development of the exercise of public freedoms, and increased interest in and protection, so the number and expanded images of academic freedom, and was a manifestation of interest in this freedom to try to determine the content or what it is and pictures, The first of these guarantees is the supervision of the constitutionality of the laws, which are carried out through judicial

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Effectiveness of the cumulative vs. normal mode of operation for combinatorial testing
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref