Preferred Language
Articles
/
jih-320
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 28 2024
Journal Name
Dental Hypotheses
Assessment of Color Change of Artificial White Spot Lesions after Sandblasting with Bioactive Glass, Resin Infiltration, or Microabrasion Followed by Color Stability Test by pH Cycling: An in Vitro Study
...Show More Authors

Introduction: This study aimed to assess the color change of human teeth with artificial enamel white spot lesions (WSLs) after sandblasting with bioactive glass, resin infiltration, and microabrasion and to test color stability after pH cycling. Methods: Fifty extracted human mandibular first molars were randomly assigned into five groups: Sound, WSLs (untreated), and WSLs sandblasted with bioactive glass (Sylc), WSLs treated by resin infiltration (ICON), and WSLs treated by microabrasion (Opalustre), respectively. All specimens underwent a pH cycling procedure. The color parameters for each specimen were assessed using an Easyshade dental spectrophotometer at different time stages then the color changes (ΔE) were calculated. Results: The

... Show More
Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Evaluation of EDI Software Application
...Show More Authors

The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed

View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Application of GIS technique in the studies on fish assemblages in Shatt Al-Arab River, Basrah, Iraq
...Show More Authors

The present study has examined the spatiotemporal varieties of the demographics of the Shatt Al-Arab River fishes and their relation to some ecological components. The aim is to forecast these groups in the unexplored parts of the waterway with an emphasis on environmental indices of diversity. Three sites in the river were selected as an observation and study of these species, which lasted from March 2019 to February 2020, the study dealt with factors affecting fishes, as Water Temperature (WT), Dissolved Oxygen (DO), Potential Hydrogen Ion (pH), Salinity (Sal), and Transparency (Tra). Gill nets, cast nets, hooks, and hand nets were adopted to collecting fish. The results indicated that the fish population comprises 60 species represent

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Back stepping-Based-PID-Controller Designed for an Artificial Pancreas model
...Show More Authors

Artificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose

 

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 05 2024
Journal Name
Pharmacia
A validated spectrophotometric analysis for simultaneous estimation of vincristine sulfate and bovine serum albumin in pure preparations using Vierordt’s method
...Show More Authors

The novel Vierordt’s approach, or simultaneous equation method, was created and validated for the concurrent determination of vincristine sulfate (VCS) and bovine serum albumin (BSA) in pure solutions utilizing UV spectrophotometry. It is simple, precise, economical, rapid, reliable, and accurate. This method depends on measuring absorbance at two wavelengths, 296 nm and 278 nm, which correspond to the λmax of VCS and BSA in deionized water, respectively. The calibration curves of VCS and BSA are linear at concentration ranges of 10–60 μg/mL and 200–1600 μg/mL, with correlation coefficient values (R2) of 1 and 0.999, respectively. The limits of detection (LOD) and quantification (LO

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Genetic Analysis by Using Partial Diallel Crossing of Maize In High Plant Densities (Estimation GCA, SCA and Some Genetic Parameters)
...Show More Authors
Abstract<p>The experiment was carried out at the Field Crops Research Station, College of Agricultural Engineering Sciences - University of Baghdad in Jadiriyah, with the aim of evaluating the performance of partial diallel hybrids and inbred lines of maize and estimating general combining ability(GCA), specific combining ability (SCA) and some genetic parameters. The experiment was carried out in two seasons, spring and fall 2020. Eight inbred lines of maize were used in the study (BI9/834, BSW18, LW/5 L8/844, ZA17W194, Z117W, ZI17W9, ZI7W4), numbered (1,2,3,4,5,6,7,8), It was sowed in the spring season and entered into a cross-program according to a partial diallel crossing system to obtain tw</p> ... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Tue Jan 11 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Elimination of the broadening in X-ray diffraction lines profile for nanoparticles by using the analysis of diffraction lines method
...Show More Authors

In this research, the results of the Integral breadth method were used to analyze the X-ray lines to determine the crystallite size and lattice strain of the zirconium oxide nanoparticles and the value of the crystal size was equal to (8.2nm) and the lattice strain (0.001955), and then the results were compared with three other methods, which are the Scherer and Scherer dynamical diffraction theory and two formulas of the Scherer and Wilson method.the results were as followsScherer crystallite size(7.4nm)and lattice strain(0.011968),Schererdynamic method crystallite size(7.5 nm),Scherrer and Wilson methodcrystallite size( 8.5nm) and lattice strain( 0.001919).And using another formula for Schearer and Wilson methodwe obtain the size of the c

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref