Preferred Language
Articles
/
IxZIXocBVTCNdQwCZkjY
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bellegarde respectively.  

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 10 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Acceleration of canine movement by laser assisted flapless corticotomy [An innovative approach in clinical orthodontics]
...Show More Authors

Background: Corticotomy-assisted orthodontic treatment is done to induce a state of increased tissue turnover and transient osteopenia, which is followed by a faster rate of orthodontic tooth movement. It considered as an adjunct treatment option for orthodontic treatment of adults. The aim of this Study was to elucidate the effectiveness of a new surgical approach for acceleration of maxillary canine retraction in human with laser assisted flapless corticotomy and evaluate its effect on vitality of pulp and gingival sulcus depth. Materials and methods: the sample comprised of 15 Iraqi patients (9 females and 6 males; mean age 21.7), who were required extraction for their maxillary first premolars followed by retraction of the canines as pa

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 10 2026
Journal Name
Journal Wlkalam
Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach
...Show More Authors

Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach

View Publication Preview PDF
Publication Date
Mon Jun 30 2025
Journal Name
Scripta Medica
Case Report: A Rare Presentation of Sigmoid Volvulus During Pregnancy With an Integrative Postoperative Approach
...Show More Authors

View Publication Preview PDF
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Preservation of heritage markets within an integrated framework to preserve the urban heritage in the historical centers of cities (selected models and experiments)
...Show More Authors

This research discusses the rehabilitation of heritage markets in the historical centers of Islamic Arab cities and their use in the field of cultural tourism as one of the most important tourist attractions and the subsequent revival of the national economy in addition to preserving the urban heritage as these markets part of the historical centers of cities. The research also discusses the preservation of the continuity of heritage markets as a product of cultural heritage value within an integrated framework to preserve the urban heritage in the historic centers of cities. The study then reviews a number of experiences of Arab and Islamic countries in the field of preserving and rehabilitating heritage markets, which qualify them to b

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
European Journal Of Scientific Research
Fast approach for arabic text encryption using genetic algorithm
...Show More Authors

As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Advanced Computer Science And Applications
Automatic Approach for Word Sense Disambiguation Using Genetic Algorithms
...Show More Authors

Abstract: Word sense disambiguation (WSD) is a significant field in computational linguistics as it is indispensable for many language understanding applications. Automatic processing of documents is made difficult because of the fact that many of the terms it contain ambiguous. Word Sense Disambiguation (WSD) systems try to solve these ambiguities and find the correct meaning. Genetic algorithms can be active to resolve this problem since they have been effectively applied for many optimization problems. In this paper, genetic algorithms proposed to solve the word sense disambiguation problem that can automatically select the intended meaning of a word in context without any additional resource. The proposed algorithm is evaluated on a col

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Fri May 01 2020
Journal Name
Journal Of Physics: Conference Series
New Approach for Solving (1+1)-Dimensional Differential Equation
...Show More Authors

View Publication Preview PDF
Scopus (18)
Crossref (10)
Scopus Crossref
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Engineering
Non-deterministic Approach for Reliability Evaluation of Steel Beam
...Show More Authors

This paper aims to evaluate the reliability analysis for steel beam which represented by the probability of Failure and reliability index. Monte Carlo Simulation Method (MCSM) and First Order Reliability Method (FORM) will be used to achieve this issue. These methods need two samples for each behavior that want to study; the first sample for resistance (carrying capacity R), and second for load effect (Q) which are parameters for a limit state function. Monte Carlo method has been adopted to generate these samples dependent on the randomness and uncertainties in variables. The variables that consider are beam cross-section dimensions, material property, beam length, yield stress, and applied loads. Matlab software has be

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Efficient Approach for Solving (2+1) D- Differential Equations
...Show More Authors

     In this article, a new efficient approach is presented to solve a type of partial differential equations, such (2+1)-dimensional differential equations non-linear, and nonhomogeneous. The procedure of the new approach is suggested to solve important types of differential equations and get accurate analytic solutions i.e., exact solutions. The effectiveness of the suggested approach based on its properties compared with other approaches has been used to solve this type of differential equations such as the Adomain decomposition method, homotopy perturbation method, homotopy analysis method, and variation iteration method. The advantage of the present method has been illustrated by some examples.

View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref