Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
This research aims to study the influence of organizational power on the achievement of entrepreneurship for business organizations. It is an analytical study of the views of a sample of managers in the Iraqi Ministry of Education. The research highlights the contribution that can be made from the knowledge of the theory of business organizations in achieving organizational success. The organizational power of the organization contributes to achieving entrepreneurship in the business environment and achieving a competitive position in the work environment. The research dealt with two variables: the first is the independent variable, the organizational power in its dimensions (Expend Power, Structural Power, Prestige Power). And t
... Show MoreA cost-effective and efficient detector was created to conduct thorough turbidimetric measurements by reaction of Co (II) ion with calcium ferro cyanide to form bright green particulate, using the method of continuous flow injection analysis, the use of NAG-5SX1-1D-SSP Analyzer in determining cobalt (II) ion in a test for the validity of the new design. The NAG-5SX1-1D-SSP Analyzer is composed of five irradiation sources of white snow leds having the diameter of 10 mm with one solar cell of 55 mm length, 13.5 mm width. Using a selector switch to select the optimum voltage to be used which was 2.7 VDC. Under conditions of optimization, cobalt (II) ion was determined at 0.005–20 mmol. L–1(n = 23) while linearity dynamic range 0.005–7 mm
... Show MoreBreastfeeding (BF) serves as a complete nutritional source for the first six months of infant’s life. Breast milk contains all essential nutrients that necessary for the physiological growth and development of infants. The aim of this study was to compare the physiological growth of infants including weight, height and head circumference who were exclusively breastfed for 6 months and those who were given bottle-fed or mixed fed and to find a percentage of exclusive breastfeeding among mothers who contributed in this study in Sulaimani city. This study was carried out in Sulaimani city/ Kurdistan region of Iraq and the cases were enrolled between the first of October 2018 and first of October 2019. The infants’ weight, height and hea
... Show MorePseudomonas aeruginosa is emerging opportunistic clinical pathogens. Clinical isolates of P. aeruginosaresist wide spectrum of antibiotics and form biofilm. The comparison study between clinical and environmental of P. aeruginosa in terms of biofilm formation and antibiotic resistance is very scanty. Thus, in current study microtiter plate technique was used to measure the biofilm formation by several clinical and environmental isolates. Moreover, the antibiotic susceptibility of these bacteria was evaluated by VITIK 2 techniques. The relationship between the antibiotic susceptibility and biofilm formation was evaluated for clinical and environmental isolates. Clinical and environm
... Show MoreQuadrotors are coming up as an attractive platform for unmanned aerial vehicle (UAV) research, due to the simplicity of their structure and maintenance, their ability to hover, and their vertical take-off and landing (VTOL) capability. With the vast advancements in small-size sensors, actuators, and processors, researchers are now focusing on developing mini UAV’s to be used in both research and commercial applications. This work presents a detailed mathematical nonlinear dynamic model of the quadrotor which is formulated using the Newton-Euler method. Although the quadrotor is a 6 DOF under-actuated system, the derived rotational subsystem is fully actuated, while the translational subsystem is under-actuated. The der
... Show MoreThe present study aims to get experimentally a deeper understanding of the efficiency of carbon fiber-reinforced polymer (CFRP) sheets applied to improve the torsional behavior of L-shaped reinforced concrete spandrel beams in which their ledges were loaded in two stages under monotonic loading. An experimental program was conducted on spandrel beams considering different key parameters including the cross-sectional aspect ratio (
This search aim to measure Hardness for Epoxy resin and for unsaturated Polyester resin as base materials for composite Hybrid and the materials used is Hybrid fiber Carbon-Kevlar. The Hand Lay-up method was used to manufacture plates of Epoxy resin (EP) and unsaturated Polyester EP,UPE backed by Hybrid fiber (Carbon-Kevlar) and with small volume fraction 5,10 and 15 for every there are Layer of fibers (1,2 and 3). The hardness test was count for material EP, UPE resin and there composites and that we notice that the Hardness (HB) decreased with increase of temperatures.
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More