Blockchain represents a new promising technology with a huge economic impact resulting from its uses in various fields such as digital currency and banking; malware represents a serious threat to users, and there are many differences in the effectiveness of antivirus software used to deal with the problem of malware. This chapter has developed a coefficient for measuring the effectiveness of antivirus software. This chapter evaluates the effectiveness of antivirus software by conducting tests on a group of protection programs using a folder containing an amount of data. These programs are applied to combat viruses contained in this folder. The study revealed that the effectiveness of antivirus software is as follows: AVG scored 0%, Advanced System Protector scored 20%, Avast scored 60%, and Malwarebytes scored 80%, respectively.
The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreTo promote sustainable steel-concrete composite structures, it is essential to develop special shear connectors that facilitate accelerated construction and deconstruction. A lockbolt demountable shear connector (LBDSC) was recently proposed. While the LBDSC has been evaluated using horizontal and vertical (standard) push-out tests, it is essential to further assess the disassembly mechanism and the positive flexural performance of prefabricated demountable composite beams (PDCBs) under both serviceability and ultimate limit states. Two full-scale test specimens of PDCBs with LBDSC were designed with partial shear connections and assessed using a three or four-point load beam setup under both cyclic and static monotonic loading conditions.
... Show MoreThis research included measuring the concentrations of natural radioactive isotopes U-238 and Th-232 and radiation dose rates for selected areas of Missan province, GR-460 system was used which has the potential to measure the concentrations of natural radioactive isotopes in (ppm) unit and measuring the radiation dose rates in μR/h unit. It was also used with the system the mobile device FH-40 which measures the radiation dose rates in units μSμ/h the measurement results showed the absence of a significant increase in the U-238 and Th-232 concentration where the concentration of isotopes of U-238 and natural Th-232 (3.35-5.46) ppm respectively it is authorized and universally accepted. In terms of radiation dose rates it ranged betwe
... Show MoreThe study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c
... Show MoreThe concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s
... Show MoreFilms of pure polystyrene (ps) and doped by bromothymol blue material with percentages(4%) prepared by using casting technique in room temperature , the absorption and transmission spectra has been recorded in the wavelength rang (200-900)nm and calculated refractive index , reflectivity, real and imaginary parts of dielectric constant and extinction coefficient . this study has been done by recording the absorption and transmission spectra by using spectrophotometer .
This work was included external morphological study of horse fly Tabanus indrae Hauser 1939 new record in Iraq, which belongs to family: Tabanidae order: Diptera. The study was involved the most important taxonomic external characters of the: head, thorax, abdomen and their appendages which are: antenna, maxillary palp, wings, legs, spotting in coloring pattern and female genitalia of abdomen
This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show More