Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
The Search stressed on the importance of the role of property tax as a tributaries of the state budget that depend on it to cover the side of public expenditures, along with the rest of the other types of taxes through a review of the tax framework and tax proceeds and stand on the research problem and its effects, according to the following logic questions : -
- What is the contribution of property tax in the overall tax revenue?
- Are there any certain problems in collection of property tax?
3. What are the factors that lead to a negative impact on the outcome of the property tax?
4. How do we strengthen the role of the property tax in the overall tax revenue?
This r
... Show MoreDirect agglutination test was used to evaluate the immunogenicity of three different antigens inoculated in hamsters as one , two and three doses which were: Group (1) inoculated with autoclaved killed Leishmania tropica , Group (2) inoculated with BCG vaccine alone while Group (3) inoculated with mixed antigens (autoclaved killed Leishmania "AKL"+ BCG).(4) Control animals inoculated with phosphate buffer saline. The maximum level of antibody titers were evaluated in animal inoculated with one , two or three dose of mixed antigens (320 , 640 and 1280) respectively when it compared with animals inoculated with corresponding doses of AKL antigen (80 , 160 and 320) respectively. While the minimum level of antibody titers were observed in ani
... Show MoreIn this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect
... Show MoreLawful protection of the human gene conceded a moral concern regarding the future of existence human. After the discovery of the human genetic map, scientific experiments and research related to the human gene increased, negative applications of genetic engineering in particular that violate essential human rights, the right to human dignity to be specific. These practices represent actual challenges to the existence and diversity of current and future generations. Therefore, the presence of legal rules at the domestic and global levels is an absolute necessity to prohibit these threats and determine civil and criminal accountability for those who infringe any laws related to this issue.
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreAbstracts:
Background: The oral cavity is a complex environment, both structurally and functionally, the hard and soft tissues are in close a proximity. Oral tissues subjected to wear throughout the life, that threatened the vitality of the pulp or increase the sensitivity of dentinal tubules. One of the common dental problems is loss of enamel or cementum, which stimulate the nerve ending in or near the pulp and manifested as pain sensation. Aim of the study: This study had done to evaluate the effects of 980nm diode Laser in diameters reduction of exposed dentinal tubules analyze the results and morphological changes of irradiated dentine surface by FE-SEM (field emission scann
... Show MoreThe present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t
... Show MoreThe manufacturing industry in Iraq has faced, during the time stages, several obstacles that have had devastating effects on the Iraqi economy. These obstacles are represented by political events and wars that have led to the depletion of most human and material resources and the suspension of most vital industrial facilities from working, And the occurrence of this major deviation in the process of economic development, For the same reasons, the contributions of the manufacturing sector to the gross domestic product varied fluctuatingly, indicating instability in the growth rates of this sector, On the other hand, the supremacy of the belief that the dominance of oil resources as a main source for creating economic growth and achieving a h
... Show MoreThe movement is considered one of the important factors which attracts the receiver attention in designing artificial works in general, and especially in the advertisements, moreover the subject of the movement in the designing advertisements needs more care and study by the scholars. From this importance and from reaching to the basic streams of the research topic (the effect of the movement in the graphic design) the problem of the research has been set according to the following wonder:
- What is the designing process that establishes the movement in the commercial advertisements designs?
The researche
... Show More