Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreA fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreKnowledge of the mineralogical composition of a petroleum reservoir's formation is crucial for the petrophysical evaluation of the reservoir. The Mishrif formation, which is prevalent in the Middle East, is renowned for its mineralogical complexity. Multi-mineral inversion, which combines multiple logs and inversions for multiple minerals at once, can make it easier to figure out what minerals are in the Mishrif Formation. This method could help identify minerals better and give more information about the minerals that make up the formation. In this study, an error model is used to find a link between the measurements of the tools and the petrophysical parameters. An error minimization procedure is subsequently applied to determine
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreRobots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreFour complexes of Co(II),Ni(II),Cu(II) and Zn(II) with the azo ligand (4-chloro-N-(2-(dimethylamino)ethyl)-5-((2-hydroxy- 4,6-dimethylphenol)diazenyl)-2-methoxybenzamide) L. The structure of ligand and complexes were confirmed on the basis of their analytical and spectral data, these dyes were tested as dyeing in cotton fabric, and also testing in light and cleaner firmness. Also, antimicrobial and antifungal activities of ligand and their complexes were evaluated and the results showed that the ZnL compound showed the higher antibacterial activity with inhibition zone of 13mm against Staphyloco-ccus epidermidis, Steptococcus sp. and Escherichia coli compared with ligand and other metal complexes .In case of ZnL compound the antifungal acti
... Show MoreFour complexes of Co(II),Ni(II),Cu(II) and Zn(II) with the azo ligand (4-chloro-N-(2-(dimethylamino)ethyl)-5-((2-hydroxy-4,6-dimethylphenol)diazenyl)-2-methoxybenzamide) L. The structure of ligand and complexes were confirmed on the basis of their analytical and spectral data, these dyes were tested as dyeing in cotton fabric, and also testing in light and cleaner firmness. Also, antimicrobial and antifungal activities of ligand and their complexes were evaluated and the results showed that the ZnL compound showed the higher antibacterial activity with inhibition zone of 13mm against Staphyloco-ccus epidermidis, Steptococcus sp. and Escherichia coli compared with ligand and other metal complexes .In case of ZnL compound the antifungal activ
... Show MoreBCl3 is toxic gas and its detection is of great importance. Thus, here, B3LYP, M06-2X, and B97D density functionals are utilized for probing the effect of decorating Zn, Cd, and Au on the sensing performance of an AlP nano-sheet (AlPNS) in detecting the BCl3. We predict that the interaction of pure AlPNS with BCl3 is physisorption, and the sensing response (SR) of AlPNS is approximately 9.2. The adsorption energy of BCl3 changes from −4.1 to −18.8, −19.1, and −19.5 kcal/mol by decorating the Zn, Cd, and Au metals into the AlPNS surface, respectively. Also, the corresponding SR meaningfully rises to 40.4, 59.0, and 80.9, indicating that by increasing the atomic number of metals, the sensitivity of metal decorated AlPNS (metal@AlPNS)
... Show MoreAccording to the European Union Water Framework Directive requirements, diatom metrics were used to assess the ecological status of surface waters in the Gaziantep central catchment (Turkey). A total of 42 diatom taxa were identified. A few environmental factors (especially lead, copper, orthophosphate, and chromium) played significant roles on the distribution of diatom assemblages among the sampling stations. The first two axes of the canonical correspondence analysis elucidated 91.6 % of the species–environment correlations with 13.9 % of the cumulative variance of species. The applied diatom indices (TIT – Trophic Index Turkey, TI – Trophic Index, and EPI-D – Eutrophication and/or Pollution Index-Diatom) showed different results
... Show More