Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
Phase change materials (PCMs) such as paraffin wax can be used to store or release large amount of energy at certain temperature at which their solid-liquid phase changes occurs. Paraffin wax that used in latent heat thermal energy storage (LHTES) has low thermal conductivity. In this study, the thermal conductivity of paraffin wax has been enhanced by adding different mass concentration (1wt.%, 3wt.%, 5wt.%) of (TiO2) nano-particles with about (10nm) diameter. It is found that the phase change temperature varies with adding (TiO2) nanoparticles in to the paraffin wax. The thermal conductivity of the composites is found to decrease with increasing temperature. The increase in thermal conductivity ha
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreIn this work, a deep computational study has been conducted to assign several qualities for the graph . Furthermore, determine the amount of the dihedral subgroups in the Held simple group He through utilizing the attributes of gamma.
Background: The stethoscope is a tool that doctors use daily in the examination of patients and it can take part in the transmission of health care-associated infections. In a single day it may come in direct contact with multiple patients and the intra hospital environment may be contaminated by various type of bacteria and possibly transmit to others.
Objective:- The study was to know the attitude and knowledge about the stethoscope hygiene behavior among physicians and to determine the types of bacterial agents that can contaminate stethoscopes.
Type of the study: The study was a cross-sectional study
Metho
... Show MoreThis research aims at calculating the optimum cutting condition for various types of machining methods, assisted by computers, (the computer program in this research is designed to solve linear programs; the program is written in v. basic language). The program obtains the results automatically, this occur through entering the preliminary information about the work piece and the operating condition, the program makes the calculation actually by solving a group of experimental relations, depending on the type of machining method (turning, milling, drilling). The program was transferred to package and group of windows to facilitate the use; it will automatically print the initial input and optimal solution, and thus reduce the effort and t
... Show MoreKE Sharquie, AA Noaimi, SD Hameed, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 15
This study deals with knowing the public relations activities of the Integrity Commission for the year 2007, knowing the contents of these activities, knowing the contents of the advertisements that it published, whether the contents of the advertisements were convincing, and whether press photographs were used in these advertisements, as well as whether symbols and slogans were used. What language and words were used to address the recipient? 1- What feelings do the contents of advertisements arouse? 2- Research objectives: This research aims to answer the following questions: What are the public relations activities carried out by the Integrity Commission? B: Are the contents of the advertisements published by the Authority convincing to
... Show More