Preferred Language
Articles
/
IxZIXocBVTCNdQwCZkjY
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics
Effect of Deposit Au thin Layer Between Layers of Perovskite Solar Cell on Cell's Performance
...Show More Authors

The present work aims to fabricate n-i-p forward perovskite solar cell (PSC) withئ structure (FTO/ compact TiO2/ compact TiO2/ MAPbI3 Perovskite/ hole transport layer/ Au). P3HT, CuI and Spiro-OMeTAD were used as hole transport layers. A nano film of 25 nm gold layer was deposited once between the electron transport layer and the perovskite layer, then between the hole transport layer and the perovskite layer. The performance of the forward-perovskite solar cell was studied. Also, the role of each electron transport layer and the hole transport layer in the perovskite solar cell was presented. The structural, morphological and electrical properties were studied with X-ray diffractometer, field emission s

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (129)
Crossref (107)
Scopus Clarivate Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Agitation Negative Social Behaviours in the Talk Shows of the (NRT) Satellite Channel: Research extracted from a master's thesis
...Show More Authors

This research asks what are negative social behaviours in the Kurdistan Region of Iraq (KRI) raised by the talk shows on the (NRT) channel? Furthermore, it aims to identify the most significant themes addressed by talk shows on the (NRT) channel regarding negative social behaviours in the KRI by using the content analysis approach through non-random purposive sampling to understand the dialogue contents that dealt with this subject. This study has reached a set of results: through its talk shows, the (NRT) channel attempts to create a media vision about the spread of negative social behaviours in the KRI and stand up to the dangers associated with these behaviours. At the same time, those programs tried to marginalize the behaviours that

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 06 2025
Journal Name
Journal Of Sport Biomechanics
Effects of an Integrated Balance and Muscle Tension Control Training Program on Kinematic Variables and Defensive Accuracy in Volleyball Players
...Show More Authors

Objective This study aims to investigate the impact of integrated training on kinematics variables and defensive accuracy in volleyball, focusing on enhancing balance and muscle tension control through proprioceptive neuromuscular facilitation (PNF) exercises. Methods The sample consisted of 14 male volleyball athletes from the first volleyball league of Al-Jaish Sports Club were divided into experimental (n=7) and control group (n=7). In the pre- and post-intervention periods, dynamic balance, muscle tension control and kinematic variables (during a lateral reaching task) as well as defensive performance accuracy upon fatigue onset of recoil laser strikes were assessed. Exposure the intervention program was carried out for six weeks, and t

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 06 2019
Journal Name
International Journal Of Dynamics And Control
Biomechanics, actuation, and multi-level control strategies of power-augmentation lower extremity exoskeletons: an overview
...Show More Authors

View Publication
Scopus (37)
Crossref (32)
Scopus Crossref
Publication Date
Fri Mar 18 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Detecting Deepfakes with Deep Learning and Gabor Filters
...Show More Authors

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue

... Show More
View Publication
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
N-Acetyl Cysteine-Cadmium Telluride NAC-CdTe QDs for Detecting the Damaged DNA in Cancerous Diseases
...Show More Authors

In this study water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals) using N-acetyl cysteine as a stabilizer were prepared to investigate the utility of quantum dots (QDs) in distinguishing damaged DNA, (extracted from blood samples of leukaemia patients), from intact DNA (extracted from blood samples of healthy individuals) to be used for biosensing application. Based on the optical characterization of the prepared QDs, the XRD results revealed the formation of the NAC-CdTe-QDs with a grain size of 7.1nm. Whereas, the SEM test showed that the spherical size of the NAC-CdTe-QDs lies within 11~33nm. NAC-CdTe-QDs have superior PL emission properties at of 550nm and UV-Vis absorption peak at 300nm. The energy gap

... Show More
View Publication
Scopus Crossref