Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel
... Show MoreAround fifty isolates of Salmonella enterica serovar Typhi were isolated from blood specimens of patients referring to several hospitals in Kirkuk province, Iraq. The results revealed that all isolates developed resistance to trimethoprim-sulfamethoxazole and chloramphenicol. However, neither sul2 nor tem genes were detected. Moreover, only ten isolates were positive for catP. Our data suggested participation of other genes or mechanisms allow these multidrug isolates to resist the antibiotics in question.
In this study, a predicated formula is been proposed to find the shear strength of non-prismatic beams with or without openings. It depends on the contributions of concrete shear strength considering the beam depth variation and existing openings, shear steel reinforcements and defines the critical shear section, the effect of diagonal shear reinforcement, the effect of inclined tensile steel reinforcement, and the compression chord influence. The verification of the proposed formula has been conducted on the experimental test results of 26 non-prismatic beams with or without openings at the same loading conditions. The results reflect that the predicted formula finds the shear capacity of non-prismatic beams with openings, it is co
... Show MoreConsider a simple graph on vertices and edges together with a total labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say defined by for all where Also, the value is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by and is the least for which G admits edge irregular h-labeling. In this article, for some common graph families are examined. In addition, an open problem is solved affirmatively.
Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time w
Due to restrictions and limitations on agricultural water worldwide, one of the most effective ways to conserve water in this sector is to reduce the water losses and improve irrigation uniformity. Nowadays, the low-pressure sprinkler has been widely used to replace the high-pressure impact sprinklers in lateral move sprinkler irrigation systems due to its low operating cost and high efficiency. However, the hazard of surface runoff represents the biggest obstacle for low-pressure sprinkler systems. Most researchers have used the pulsing technique to apply variable-rate irrigation to match the crop water needs within a normal application rate that does not produce runoff. This research introduces a variable pulsed irrigation algorit
... Show MoreThe military presence in the Gulf region after the British withdrawal from it in 1971 was one of the most important pillars of the American strategy to climb the ladder of global leadership, as the geostrategic features that the region enjoyed provided factors of controlling energy sources and global trade routes. The United States of America guarantees Western Europe and Japan the process of access to energy sources and the exclusion of its opponents from the region, especially the Soviet Union, and the growing American military presence in the Gulf after the invasion of Iraq in 2003. On the other hand, the region experiences many contradictions, some of which threaten its security, such as the exacerbation of disputes between its count
... Show MoreIn this paper, third order non-polynomial spline function is used to solve 2nd kind Volterra integral equations. Numerical examples are presented to illustrate the applications of this method, and to compare the computed results with other known methods.
This study investigated the structural behavior of a beam–slab member fabricated using a steel C-Purlins beam carrying a profile steel sheet slab covered by a dry board sheet filled with recycled aggregate concrete, called a CBPDS member. This concept was developed to reduce the cost and self-weight of the composite beam–slab system; it replaces the hot-rolled steel I-beam with a steel C-Purlins section, which is easier to fabricate and weighs less. For this purpose, six full-scale CBPDS specimens were tested under four-point static bending. This study investigated the effect of using double C-Purlins beams face-to-face as connected or separated sections and the effect of using concrete material that contains different recycled
... Show MoreIn this paper, the construction of Hermite wavelets functions and their operational matrix of integration is presented. The Hermite wavelets method is applied to solve nth order Volterra integro diferential equations (VIDE) by expanding the unknown functions, as series in terms of Hermite wavelets with unknown coefficients. Finally, two examples are given