Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively. Â
Objectives: The study aims to identify the effects of an educational program on patients’ knowledge about vascular access care and to find out the relationship between patients knowledge scores and their selected demographic variable. &
... Show MoreVictorian age is known as a time of perpetual change. It is a time of new industrialization, increased urbanization and new technology. Therefore, one of the strongest undercurrents of this is the position of women. Woman at that time was viewed as “an angel in the house” especially this who belongs to the upper-middle class. She is described in such term because she spends much time in her domestic domain. Therefore, she should be passive, obedient and dependent. Despite the Victorian society contains several classes; women are defined under two labels: the angel and the demon or the whore. The angel woman can be any woman from the lower middle class to the aristocracy, while the whore refers to any working class woman. The differen
... Show MoreEuphemisms are advantageous in people’s social life by turning sensitive into a more acceptable ones so that resentful feelings and embarrassment can be avoided. This study investigates the ability of Iraqi English learners in using euphemistic expressions, meanwhile, raising their awareness and the faculty members in English teaching faculties regarding the relevance of discussing the topics that demand euphemisation. This study comprised three stages: initial test, explicit instruction with activities, and a final test for the students’ development in this domain. A test has been distributed among 50 respondents, who are at the fourth year of their undergraduate study at the University of Babylon/ College of Basic Education. The lo
... Show MoreThe detection for Single Escherichia Coli Bacteria has attracted great interest and in biology and physics applications. A nanostructured porous silicon (PS) is designed for rapid capture and detection of Escherichia coli bacteria inside the micropore. PS has attracted more attention due to its unique properties. Several works are concerning the properties of nanostructured porous silicon. In this study PS is fabricated by an electrochemical anodization process. The surface morphology of PS films has been studied by scanning electron microscope (SEM) and atomic force microscope (AFM). The structure of porous silicon was studied by energy-dispersive X-ray spectroscopy (EDX). Details of experimental methods and results are given and discussed
... Show MoreAccurate prediction and optimization of morphological traits in Roselle are essential for enhancing crop productivity and adaptability to diverse environments. In the present study, a machine learning framework was developed using Random Forest and Multi-layer Perceptron algorithms to model and predict key morphological traits, branch number, growth period, boll number, and seed number per plant, based on genotype and planting date. The dataset was generated from a field experiment involving ten Roselle genotypes and five planting dates. Both RF and MLP exhibited robust predictive capabilities; however, RF (R² = 0.84) demonstrated superior performance compared to MLP (R² = 0.80), underscoring its efficacy in capturing the nonlinear genoty
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreDeepfake is a type of artificial intelligence used to create convincing images, audio, and video hoaxes and it concerns celebrities and everyone because they are easy to manufacture. Deepfake are hard to recognize by people and current approaches, especially high-quality ones. As a defense against Deepfake techniques, various methods to detect Deepfake in images have been suggested. Most of them had limitations, like only working with one face in an image. The face has to be facing forward, with both eyes and the mouth open, depending on what part of the face they worked on. Other than that, a few focus on the impact of pre-processing steps on the detection accuracy of the models. This paper introduces a framework design focused on this asp
... Show MoreElectronic banking plays a prominent role in providing the best banking services and upgrading the banking sector for the better, so this study aimed to shed light on the most prominent obstacles that prevent the application of electronic banking in banks operating in the city of Nasiriyah, and in order to achieve this goal the researcher used the descriptive analytical approach And through a questionnaire form that was distributed to a group of employees, numbering (60) employees in the upper, middle and operational departments in a number of branches of private banks operating in the city of Nasiriyah, namely (the Iraqi Trade Bank, the Gulf Commercial Bank, the Bank of Baghdad, the Union Bank of Iraq), which represented The stu
... Show More