Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively. Â
Analysis system of sports players is very important for individuals in weightlifting. Assessment of player and strength is important for the performance of weightlifting. This paper proposes an analytical method for weightlifters with check-by-frame video. This analysis system can compute the major steps of seven positions in both snatch and clean and jerk methods in frame-video weightlifting monitoring of movements. Each user can compute the major steps of the seven positions of Hu moments among two frames in the video during training, and the Euclidian distance can be computed for the Hu moment values and lifting moment values in the snatch and clean and jerk methods during training. The outcome of the proposed system shows on efficien
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThe aim of this study was to propose and evaluate an eco-epidemiological model with Allee effect and nonlinear harvesting in predators. It was assumed that there is an SI-type of disease in prey, and only portion of the prey would be attacked by the predator due to the fleeing of the remainder of the prey to a safe area. It was also assumed that the predator consumed the prey according to modified Holling type-II functional response. All possible equilibrium points were determined, and the local and global stabilities were investigated. The possibility of occurrence of local bifurcation was also studied. Numerical simulation was used to further evaluate the global dynamics and the effects of varying parameters on the asymptotic behavior of
... Show MoreBackground: Mouthwashes used widely as ancillary to mechanical oral hygiene methods. Little information provided about the effect of mouthwashes on ions released from orthodontic brackets. Therefore, the present study has been established to evaluate the effect of different mouthwashes on the corrosion resistance and the biocompatibility of two brands of brackets. Materials and Methods: Eighty premolar stainless steel brackets were used (40 brackets from each brand). They were subdivided into four subgroups (n=10) according to immersion media (deionized distilled water, Corsodyl, Listerine and Silca herb mouthwashes). Each bracket was stored in a closely packed glass tube filled with 15ml of the immersion media and incubated for 45 days at
... Show MoreInfographics have the capability to organize and display information in a way that is easy for viewers to retrieve and make observations. While infographics have been successful in various fields, their potential benefits in composition writing have not been explored. The primary objective of this study is to investigate the perspectives of Iraqi EFL students who used infographics as an educational technology tool in composition writing, and to identify how gender influences students’ performance when using infographics in EFL writing classes. The significance of this study lies in its integration of infographics as an educational technology tool for teaching writing, aligning with the current trend of technology integration in educati
... Show MoreThe almighty Al-Bari imposed on Muslims easy and accessible worshipers for every individual who is eligible to commission, so whoever performed it rightfully, God rewarded it with the best reward. From the Muslim, the Almighty made the Almighty to the types of acts of worship and acts of righteousness as a reason for the remission of sins that were advanced and late, so I chose a topic (from the hadiths of righteous deeds mentioned in the atonement of sins) as a research drawn from the master’s thesis called (the hadiths of the atoners of sins that were presented and delayed - An analytical study- ), And collect in this research kinds of acts of righteousness that bring the mercy of God Almighty to His servants and be a reason for the
... Show MoreRecurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al
... Show MoreCollapse of the vapor bubble condensing in an immiscible is investigated for n-pentane and n-hexane vapors condensing in cold water and n-pentane in two different compositions of glycerin- water mixture. The rise velocity and the drag coefficient of the two-phase bubble are measured.
Today, dimethyl ether (DME) is changing to ordinarily worn as a superb aerosol propellant and refrigerant for its eco-friendly characteristics. Lately, with the development of novel chemical energy in the coal industries, it has become a fascinating field of research as an alternative green fuel for diesel machines due to the high cetane number. The DME synthesis processes include catalytic dehydrating methanol in an adiabatic fixed-bed reactor. In this study, to investigate the chemical conditions of the methanol dehydration reaction, CFD simulations of the adiabatic reactor have been assessed. The advantage of the work is a sensitivity analysis was run to find the effect of pressure, kinetics, and velocity on the reactor performan
... Show More