Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the limitation of traditional AVs, we proposed a virus detection system based on extracting Application Program Interface (API) calls from virus behaviors. The proposed research uses static analysis of behavior-based detection mechanism without executing of software to detect viruses at user mod by using Markov Chain.
After looking at the books of the first two grammarians, may God have mercy on them and reward them for what they have provided us with the rules of service to the Book of God and service to Arabic, we must highlight some of the things that the grammarians wanted to clarify, which did not come out of what they proved, but we are working on the statement of the issuance of the passport Provisions from the syntactic industry, and whether it is intended to prove a rule is not very added to the statement of speech, and we know that language, any language was the function of understanding; therefore they said: (speech is a useful word that indicates the benefit improves silence on them), and this concept between Grammatical controls and conte
... Show MorePrograms and performance budget represents a sophisticated method of public budget numbers, which includes all allocations to be determined for each job or activity within a government entity, which is analyzed according to their needs and costs, and this method can be applied using one of the cost accounting techniques, which is the technique of analyzing the value chain that reduces costs by avoiding activities that do not add value and enhance activities that add value to the economic entity, the current research aims to develop the budget system in government entity by using the budget of programs and performance as a tool for planning and monitoring events and activities, thereby reducing the waste of public money by reducing unnecessa
... Show MoreThe current study was designed to investigate the presence of aflatoxin M1 in 25 samples of pasteurized canned milk which collected randomly from some Iraqi local markets using ELISA technique. Aflatoxin M1 was present in 21 samples, the concentration of aflatoxin M1 ranged from (0.25-50 ppb). UV radiation (365nm wave length) was used for detoxification of aflatoxin M1 (sample with highest concentration /50 ppb of aflatoxin M1 in two different volumes ((25 & 50 ml)) for two different time (15 & 30 min) and 30, 60, 90 cm distance between lamp and milk layer were used for this purpose). Results showed that distance between lamp and milk layer was the most effective parameter in reduction of aflatoxin M1, and whenever the distance increase the
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreThe new, standard molecular biologic system for duplicating DNA enzymatically devoid of employing a living organism, like E. coli or yeast, represents polymerases chain reaction (PCR). This technology allows an exponential intensification of a minor quantity of DNA molecule several times. Analysis can be straightforward with more DNA available. A thermal heat cycler performs a polymerization chain reaction that involves repeated cycles of heating and cooling the reactant tubes at the desired temperature for each reaction step. A heated deck is positioned on the upper reaction tube to avoid evaporating the reaction mixture (normally volumes range from 15 to 100 l per tube), or an oil layer can be placed on a reaction mixture su
... Show MoreThis paper aims to study Antonia's character and her mannish behavioral transition throughout the novel entitled My Antonia. Willa presents Antonia who shows her resolution and courage in facing and dealing with personal dilemmas and social circumstances. Willa portrays Antonia, who struggles in the new society and culture by working hard in changing the salty land of Nebreska and her destiny . Working in salty land day and night forces Antonia to lose her tender behavior and her beauty as a woman is changed too. She achieves her goals to live with her family in a new place with a dignity and respect though she looks like a man in her strength and body built . Willa Cather tries to explain that the major&
... Show MoreObjective: The present study aims at identifying the dimensions behind juvenile delinquency, and to identify their
socio-demographic characteristics of gender, age, and type of delinquency.
Methodology: A descriptive study was conducted in correctional schools in Baghdad City to identify the
behavioral, psychological, and social dimensions contributed to juvenile delinquency. The study sample consisted
of (50) juvenile delinquents, of them, 27 males, and 23 females whose ages range from (12 - 20) years. Those
delinquents live in males’ correctional school in Al-Shalichia, and females’ correctional school in Al-Karradah, in
Baghdad City. The study sample was selected in purposively. The study questionnaire was design
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThe aim of this study to identity using Daniel's model and Driver’s model in learning a kinetic chain on the uneven bars in the artistic gymnastics for female students. The researchers used the experimental method to design equivalent groups with a preand post-test, and the research community was identified with the students of the third stage in the college for the academic year 2020-2021 .The subject was, (3) class were randomly selected, so (30) students distributed into (3) groups). has been conducted pretesting after implementation of the curriculum for (4) weeks and used the statistical bag of social sciences(SPSS)to process the results of the research and a set of conclusions was reached, the most important of which is t
... Show MoreVoice Activity Detection (VAD) is considered as an important pre-processing step in speech processing systems such as speech enhancement, speech recognition, gender and age identification. VAD helps in reducing the time required to process speech data and to improve final system accuracy by focusing the work on the voiced part of the speech. An automatic technique for VAD using Fuzzy-Neuro technique (FN-AVAD) is presented in this paper. The aim of this work is to alleviate the problem of choosing the best threshold value in traditional VAD methods and achieves automaticity by combining fuzzy clustering and machine learning techniques. Four features are extracted from each speech segment, which are short term energy, zero-crossing rate, auto
... Show More