Preferred Language
Articles
/
IxZIXocBVTCNdQwCZkjY
An integrated multi layers approach for detecting unknown malware behaviours

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Detecting Suicidal Tendencies among Secondary School Students

The current research aims to detect the level of suicidal tendencies among secondary school students in terms of gender and educational stage (intermediate school students and high school students). The researcher adopted Al Hafeez's (2017) scale for suicidal tendencies, it consists of (57) items including six domains, namely: suicidal ideation, social motives for suicide, tendency to self-harm, desire for death, indifference and pessimism about life, willingness to commit suicide. The scale was modified to be (42) items after it was exposed to a group of experts. The scale was applied to a sample of (200) male and female students from secondary schools in Baghdad Governorate (Karkh - Rusafa) for the academic year 2021-2022. The results

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Modern Trends In Engineering And Research (ijmter)
An image processing oriented optical mark reader based on modify multi-connect architecture (MMCA)

Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and tota

... Show More
Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
Improving Extractive Multi-Document Text Summarization Through Multi-Objective Optimization

Multi-document summarization is an optimization problem demanding optimization of more than one objective function simultaneously. The proposed work regards balancing of the two significant objectives: content coverage and diversity when generating summaries from a collection of text documents.

     Any automatic text summarization system has the challenge of producing high quality summary. Despite the existing efforts on designing and evaluating the performance of many text summarization techniques, their formulations lack the introduction of any model that can give an explicit representation of – coverage and diversity – the two contradictory semantics of any summary. In this work, the design of

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
Scopus (59)
Crossref (58)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
New Approach for Calculate Exponential Integral Function

     This manuscript presents a new approach to accurately calculating exponential integral function that arises in many applications such as contamination, groundwater flow, hydrological problems and mathematical physics. The calculation is obtained with easily computed components without any restrictive assumptions

     A detailed comparison of the execution times is performed. The calculated results by the suggested approach are better and faster accuracy convergence than those calculated by other methods. Error analysis of the calculations is studied using the absolute error and high convergence is achieved. The suggested approach out-performs all previous methods  used to calculate this function and this decision is

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Modis Satellite Data Evaluation for Detecting the Dust Storm Using Remote Sensing Techniques Over Iraq
Abstract<p>The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi</p> ... Show More
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Role of the Auditor in Confirming the Integrated Reports - An Exploratory Study on a Sample of External Auditors in Iraq-

  The aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.

  The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer

... Show More
Crossref
View Publication Preview PDF