Preferred Language
Articles
/
5xeaNo8BVTCNdQwCVWLC
Evaluating Antivirus Effectiveness Against Malware in Ascending Order for Increasing Blockchain Endpoint Protection
...Show More Authors

Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.

Crossref
View Publication
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Performance Study of Electrodialysis for Treatment Fuel Washing Wastewater
...Show More Authors

In this work, electrodialysis (ED) has been demonstrated to be appropriate technique for reducing the electrical conductivity of real wastewater from fuel washing unit, which has been previously treated by other electrochemical technology (electrocoagulation and electrooxidation).  A five cell electrodialysis stack, with an active membrane area of 60 cm2 per cell was employed. During a batch recirculation mode ED system, the effects of parameters such as electrical potential applied (6-18 V) and flow rate of streams (0.5-1.7 L/min.) on the performance of the total dissolved solids (TDS) separation and specific power consumption (SPC) were studied. The results indicate that the process of ED under potential (15 V) and flow

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Efficient Iterative Method for Solving Korteweg-de Vries Equations
...Show More Authors

The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of 

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Sat Apr 09 2022
Journal Name
Wireless Personal Communications
Strongly Connected Ramanujan Graphs for Highly Symmetric LDPC Codes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Aip Conference Proceedings
The best interpolation methods for evaluate water table pollution
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Nov 19 2024
Journal Name
Aip Conference Proceedings
CT scan and deep learning for COVID-19 detection
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Computational And Theoretical Nanoscience
Three-Dimensional Seismic Response Analysis for a Rockfill Dam
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 08 2022
Journal Name
Mathematical Statistician And Engineering Applications
Illation for the Groups SL(2,112 ) and SL(2,132 )
...Show More Authors

Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
(?m 10.6) Design study for Reserve of laser CO2
...Show More Authors

In this paper , the CO2 laser receiver system is designed and studied, with wavelength laser 10.6 ?m in room temperature , and to evaluate the performance and discussion it via the package of optical design (ZEMAX), from its output the Spot Diagram is measured through RMS ,and from the Ray fan plot , the aberrations is found which is the normal error for the best focus named (under corrected ) , the other output was the Geometric Encircled Energy in the spot diagram . and found that the radius of spot diagram at 80% (R80%) from the total energy ,and focal shift .The designed system have high efficiency and low cost .

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Transactions On Emerging Topics In Computational Intelligence
Reservoir Network With Structural Plasticity for Human Activity Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (3)
Scopus Clarivate Crossref