Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively. Â
The research topic was chosen because of the importance of communication in organizations in general and the marketing process in particular. Without communication, the organization can not live and continue ,The problem of study diagnosis the reduction in sales in the company of plant oils in some its classes and weakness in differentiation and its reputation at market in spit if having good products with standardized features And lack of customer communication channels, also the company does not have any whole view about the concept of marketing communication, Therefore, This sudy aimed ro define to know the type of relationship between the extent of the impact of the integrated marketing
... Show MoreThe reservoir characterization and rock typing is a significant tool in performance and prediction of the reservoirs and understanding reservoir architecture, the present work is reservoir characterization and quality Analysis of Carbonate Rock-Types, Yamama carbonate reservoir within southern Iraq has been chosen. Yamama Formation has been affected by different digenesis processes, which impacted on the reservoir quality, where high positively affected were: dissolution and fractures have been improving porosity and permeability, and destructive affected were cementation and compaction, destroyed the porosity and permeability. Depositional reservoir rock types characterization has been identified de
Abstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s
This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com
... Show MoreThis search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as
... Show More
The purpose of this research is to improve the organizational performance of the Oil Projects Company by adopting an approach to strategic change، and finding appropriate solutions to the problems facing the company. The researcher adopted in designing his research by conducting a survey of previous literature that dealt with approaches to strategic change، as the results of the survey showed that most researchers agree on the approach of renewal and modernization، Which formed a starting point for the researcher to identify the extent of the company's management interest in renewal and modernization to improve its level of performance، and the quality of the procedures followed on the ground that is related to
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
According to the current situation of peroxidase (POD), the relevant studies on this enzyme indicated its importance as a tool in clinical biochemistry and different industrial fields. Most of these studies used the fruits and vegetables as source of this enzyme. So that in order to couple the growing requirements for POD with the recent demands for reduc-ing disposal volume by recycling the plant waste, the aim of the present study was to extract POD through management of municipal bio-waste of Iraqi maize species. A simple, green and economical method was used to extract this enzyme. Our results revealed that maize cobs are rich sources of POD, where the activity of this enzyme was found to be 7035.54 U/g of cobs. In pilot experiments thi
... Show MoreThe study aims to identify the impact of the implementation of the integrated education strategy in the curriculum of the Arabic language for the seventh grade on the academic achievement in the schools of the capital Amman. The researcher adopted the experimental method, where two divisions of the seventh grade students were chosen from the secondary school for girls. The sample of the study was 60 students divided into two equal groups: 30 students represented the experimental group (A) and (30) students represented the control group. To collect the needed data, a test of (40) Multiple Choices was used. The results showed statistically significant differences between the mean scores of the experimental group who were taught acc
... Show MoreFinancial fraud remains an ever-increasing problem in the financial industry with numerous consequences. The detection of fraudulent online transactions via credit cards has always been done using data mining (DM) techniques. However, fraud detection on credit card transactions (CCTs), which on its own, is a DM problem, has become a serious challenge because of two major reasons, (i) the frequent changes in the pattern of normal and fraudulent online activities, and (ii) the skewed nature of credit card fraud datasets. The detection of fraudulent CCTs mainly depends on the data sampling approach. This paper proposes a combined SVM- MPSO-MMPSO technique for credit card fraud detection. The dataset of CCTs which co
... Show More