Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively. Â
The aim of the research is to apply fibrewise multi-emisssions of the paramount separation axioms of normally topology namely fibrewise multi-T0. spaces, fibrewise multi-T1 spaces, fibrewise multi-R0 spaces, fibrewise multi-Hausdorff spaces, fibrewise multi-functionally Hausdorff spaces, fibrewise multi-regular spaces, fibrewise multi-completely regular spaces, fibrewise multi-normal spaces and fibrewise multi-functionally normal spaces. Also we give many score regarding it.
Researchers have identified and defined β- approach normed space if some conditions are satisfied. In this work, we show that every approach normed space is a normed space.However, the converse is not necessarily true by giving an example. In addition, we define β – normed Banach space, and some examples are given. We also solve some problems. We discuss a finite β-dimensional app-normed space is β-complete and consequent Banach app- space. We explain that every approach normed space is a metric space, but the converse is not true by giving an example. We define β-complete and give some examples and propositions. If we have two normed vector spaces, then we get two properties that are equivalent. We also explain that
... Show MoreIn this paper, a new modification was proposed to enhance the security level in the Blowfish algorithm by increasing the difficulty of cracking the original message which will lead to be safe against unauthorized attack. This algorithm is a symmetric variable-length key, 64-bit block cipher and it is implemented using gray scale images of different sizes. Instead of using a single key in cipher operation, another key (KEY2) of one byte length was used in the proposed algorithm which has taken place in the Feistel function in the first round both in encryption and decryption processes. In addition, the proposed modified Blowfish algorithm uses five Sboxes instead of four; the additional key (KEY2) is selected randomly from additional Sbox
... Show MoreBig data analysis is essential for modern applications in areas such as healthcare, assistive technology, intelligent transportation, environment and climate monitoring. Traditional algorithms in data mining and machine learning do not scale well with data size. Mining and learning from big data need time and memory efficient techniques, albeit the cost of possible loss in accuracy. We have developed a data aggregation structure to summarize data with large number of instances and data generated from multiple data sources. Data are aggregated at multiple resolutions and resolution provides a trade-off between efficiency and accuracy. The structure is built once, updated incrementally, and serves as a common data input for multiple mining an
... Show MoreIn this work, the effect of the addition of bright nickel plating and silver carried out by the electroplating method has been studied, on the coating of copper nanoparticles on the copper base metal via the process of thermal evaporation. The improvement of the solar absorber using CuNP in combination with the bright nickel and silver was obtained to be better than copper nanoparticles individually. A bright nickel enhanced the absorbed thermal stability. Also, other optical properties, absorptions, and emissivity slightly decreased from (93% to 87%), while the existence of silver had a slight impact on absorption of about (86.50%). On the other hand, thermal conductivity was evaluated using hot disk analyzer. The results showed a good
... Show MoreA roundabout is a highway engineering concept meant to calm traffic, increase safety, reduce stop-and-go travel, reduce accidents and congestion, and decrease traffic delays. It is circular and facilitates one-way traffic flow around a central point. The first part of this study evaluated the principles and methods used to compare the capacity methods of roundabouts with different traffic conditions and geometric configurations. These methods include gap acceptance, empirical, and simulation software methods. Previous studies mentioned in this research used various methods and other new models developed by several researchers. However, this paper's main aim is to compare different roundabout capacity models for acceptabl
... Show MoreIn this paper, we propose a new and efficient ferroelectric nanostructure metal oxide lithium niobate [(Li1.075Nb0.625Ti0.45O3), (LNTO)] solid film as a saturable absorber (SA) for modulating passive Q-switched erbium-doped fiber laser (EDFL). The SA is fabricated as a nanocomposite solid film by the drop-casting process in which the LNTO is planted within polyvinylidene fluoride-trifluoroethylene [P(VDF-TrFE)] as host copolymer. The optical and physical characteristics of the solid film are experimentally established. The SA is incorporated within the cavity of EDFL to examine its capability for producing multi-wavelength laser. The experimental results proved that a multi-wavelength laser is produced, where stable four lines with central
... Show More