Preferred Language
Articles
/
IxZIXocBVTCNdQwCZkjY
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Gjra - Global Journal For Research Analysis
Inclination of the Lumbosacral angle in normal individuals: An MRI study
...Show More Authors

Inclination Of The Lumbosacral Angle In Normal Individuals: An Mri Study,GJRA - Global Journal For Research Analysis(GJRA) GJRA is a double reviewed monthly print journal that accepts research works. 36572+ Manuscript submission, 9855+ Research Paper Published, 100+ Articles from over 100 Countries

View Publication Preview PDF
Publication Date
Thu Oct 09 2025
Journal Name
Al–bahith Al–a'alami
Semiotics of Political Caricature in the Palestinian Newspapers An Analytical Study
...Show More Authors

This study aims to study the political caricature and its indications in the Palestinian newspapers, to know its subjects, the active characters, the artistic styles, and the symbols the caricaturists use.

The study concluded that there is a variety of subjects that the political caricature handled in the studied newspapers and the degree of interest in every subject. The subjects related to the international subjects came first (% 24.5) and the other subjects came next (% 22.2).

The results showed the caricaturists relied on unnamed symbolic active characters that came first (% 62.3) and named symbolic characters (% 11.1). The positive characteristics of the Palestinian figures were higher than the negative ones, and the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improving of Design Parameters of an Industrial Continuous Catalytic Reforming Reactors
...Show More Authors

Catalytic reforming of naphtha occupies an important issue in refineries for obtaining high octane gasoline and aromatic compounds, which are the basic materials of petrochemical industries. In this study, a novel of design parameters for industrial continuous catalytic reforming reactors of naphtha is proposed to increase the aromatics and hydrogen productions. Improving a rigorous mathematical model for industrial catalytic reactors of naphtha is studied here based on industrial data applying a new kinetic and deactivation model. The optimal design variables are obtained utilizing the optimization process in order to build the model with high accuracy and such design parameters are then applied to get the best configuration of this pro

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Petrophysical Properties of an Iraqi Carbonate Reservoir Using Well Log Evaluation
...Show More Authors

This research was aimed to determine the petrophysical properties (porosity, permeability and fluid saturation) of a reservoir. Petrophysical properties of the Shuiaba Formation at Y field are determined from the interpretation of open hole log data of six wells. Depending on these properties, it is possible to divide the Shuiaba Formation which has thickness of a proximately 180-195m, into three lithological units: A is upper unit (thickness about 8 to 15 m) involving of moderately dolomitized limestones; B is a middle unit (thickness about 52 to 56 m) which is composed of dolomitic limestone, and C is lower unit ( >110 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
An Extended Subclass of Meromorphic Multivalent Functions Involving Ruscheweyh Derivative Operator
...Show More Authors

     In this paper, we introduce and discuss an extended subclass〖 Ą〗_p^*(λ,α,γ) of meromorphic multivalent functions involving Ruscheweyh derivative operator. Coefficients inequality, distortion theorems, closure theorem for this subclass are obtained.

View Publication
Scopus Crossref
Publication Date
Mon Dec 02 2024
Journal Name
Engineering, Technology & Applied Science Research
An Artificial Neural Network Prediction Model of GFRP Residual Tensile Strength
...Show More Authors

This study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Concepts of statistical learning and classification in machine learning: An overview
...Show More Authors

Statistical learning theory serves as the foundational bedrock of Machine learning (ML), which in turn represents the backbone of artificial intelligence, ushering in innovative solutions for real-world challenges. Its origins can be linked to the point where statistics and the field of computing meet, evolving into a distinct scientific discipline. Machine learning can be distinguished by its fundamental branches, encompassing supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning. Within this tapestry, supervised learning takes center stage, divided in two fundamental forms: classification and regression. Regression is tailored for continuous outcomes, while classification specializes in c

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Thesis
Design and Implementation proposed Encoding and Hiding Text in an Image
...Show More Authors

NAA Mustafa, University of Sulaimani, Ms. c Thesis, 2010 - Cited by 4

View Publication
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Similar judgments in the sacred heavenly books (Quran and the Bible): An analytical study
...Show More Authors

The research tagged with (similar rulings in the holy heavenly books - the Holy Qur’an and the Bible) highlights that there are a number of rulings in the heavenly books that are similar to each other in terms of content, meaning and significance and did not change from one prophet to another because they relate to the basic interests on which social relations are built. Documenting ties, preserving rights, preventing abuse, etc. These are among the divine purposes in clarifying rulings in order to reach their goals and achieve their goals. Therefore, by combining these rulings, many problems and incidents that are the subject of disagreement and doubt between the two religions can be achieved and addressed. Those who want reform, righ

... Show More
View Publication Preview PDF