Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively. Â
The study is dealing with an application reengineering process clean solar cells in the Ministry of electricity, as aimed at the possibility of the applicability and impact of re-engineering to achieve the level of performance of the Ministry's operations, with the application of the cleaning process solar cells, developed, improved and found a correlation, statistically significant effect between variable re-engineering and performance as well as the application of process reengineering clean solar cells:1- Before the re-engineering process the total time for cleaning up and solar cell 20 minutes and number of columns performed per day 24 columns and total columns750 which were completed per month that re
... Show MoreThe main idea of this research is that the researcher believes that media research remains useless unless its goals and results are achieved by using the correct scientific tools. The researcher chooses 100 research papers of about 35% of the published ones, 10 of them are excluded because they are outside media. We use a simple and randomized sample including the three departments of media: journalism, television and radio journalism and public relations. The researcher adopts statistical methods such as Fay coefficient, correlation coefficient, Pearson correlation coefficient and straight line equation.
The researcher uses an analytical form followed by analysis of content, them the scale. The results are found in 58 researches, w
The aim of this paper is to study the frames of Argument of normalization with Israel on the websites of the satellite channels directed in the Arabic language (Al-Alam and Al-Hurra Iraq) channels by analyzing the mechanisms of framing an Argument, The way in which we frame an issue largely determines how that issue will be understood and acted upon، The research adopted the survey method applied to the sites of(Al-
Alam and Al-Hurra) channels, at the period 13 Aug. - 12 Nov. 2020, which included (855) news items, (633) for Al-Alam channel website, and (222) for Alhurra Iraq channel website.
The most important results are: The two channels dependence on the Argument Directed, Al-Alam channel focuses on Islamic and Arab attitudes,
Commercial graphite (CGT) powder was used as an adsorbent surface for cationic dye, Janus green (JG), from aqueous solutions. This study aims to highlight the practical significance of using inexpensive CGT as an efficient adsorbent for the removal of JG dye from industrial wastewater. CGT was characterized by Fourier transform infrared spectroscopy, scanning electron microscopy, and X-ray diffraction. The adsorption process was investigated by examining parameters like the weight of the adsorbent, contact time, and temperature. Pseudo-second-order kinetic (PSO), pseudo-first-order, and intraparticle diffusion were used for analyzing the kinetic data. JG dye's adsorption kinetics fit the PSO kinetic model well (R2= 0.999). Furthermo
... Show MoreIn this paper, the problem of resource allocation at Al-Raji Company for soft drinks and juices was studied. The company produces several types of tasks to produce juices and soft drinks, which need machines to accomplish these tasks, as it has 6 machines that want to allocate to 4 different tasks to accomplish these tasks. The machines assigned to each task are subject to failure, as these machines are repaired to participate again in the production process. From past records of the company, the probability of failure machines at each task was calculated depending on company data information. Also, the time required for each machine to complete each task was recorded. The aim of this paper is to determine the minimum expected ti
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More<span lang="EN-US">This paper presents the comparison between optimized unscented Kalman filter (UKF) and optimized extended Kalman filter (EKF) for sensorless direct field orientation control induction motor (DFOCIM) drive. The high performance of UKF and EKF depends on the accurate selection of state and noise covariance matrices. For this goal, multi objective function genetic algorithm is used to find the optimal values of state and noise covariance matrices. The main objectives of genetic algorithm to be minimized are the mean square errors (MSE) between actual and estimation of speed, current, and flux. Simulation results show the optimal state and noise covariance matrices can improve the estimation of speed, current, t
... Show MoreEarth cover of the city of Baghdad was studied exclusively within its administrative border during the period 1986-2019 using satellite scenes every five years, as Landsat TM5 and OLI8 satellite images were used. The land has been classified into ten subclasses according to the characteristics of the land cover and was classified using the Maximum Likelihood classifier. A study of the changing urban reality of the city of Baghdad during that period and the change of vegetation due to environmental factors, human influences and some human phenomena that affected the accuracy of the classification for some areas east of the city of Baghdad is presented. The year 2019 has been highlighted because of its privacy in changing the land cover of th
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More