In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from the whole features set. Thus, it obtains efficient botnet detection results in terms of F-score, precision, detection rate, and number of relevant features, when compared with DT alone.
The occurrences of invasive candidiasis has increased over the previous few decades. Although Candida albicans considers as one of the most common species of organisms, that cause acquired fungal infections. Candida albicans is an opportunistic fungal pathogen and inherent in as a lifelong, the yeast is present in healthy individuals as a commensal, and can reside harmlessly in human body. However, in immuno-compromised individuals, the fungus can invade tissues, producing superficial infections and, in severe cases, life-threatening systemic infections. This review wills emphasis on virulence factor of C. albicans including (adhesion, invasion, candida proteinase, and phenotypic switching and biofilm formation. I
... Show MoreA study of the hadiths of supplication orchestration
Construction projects are characterized as projects with multi phases and activities, complex, unique, and have many different parties and stakeholders. Risks could appear at one or more of the construction project stages and may affect the achievement of project objectives. Therefore, one of the key elements in the planning phase of any project is the risk management process (RMP). This study attempts to understand the terminology of risk in general, risk management, and response to risk in particular. This study is mainly a review of thirty-eight studies that have been published between 1997 and 2020 that demonstrate the importance of the crucial phase of risk response from the risk management process and its impact on
... Show MoreBackground: Lung cancer is responsible for the most
cancer deaths in both men and women throughout the
world. Deaths from lung cancer (160,440 in 2004,
according to the National Cancer Institute) exceed the
number of deaths from four other major cancers combined
(breast, colon, pancreatic and prostate).
Objective: To assess the behavior and the approaches of
lung cancer in a sample of Iraqi patients.
Methods: This descriptive retrospective study was
performed using the records of 390 patients proved to have
lung cancer that had attending the Thoracic Surgery
Department of Surgical Specialties Hospital-Medical City
\Baghdad for the period from January, 1st
, 2001 to
December, 31st
,2002.
Res
In this paper we present the theoretical foundation of forward error analysis of numerical algorithms under;• Approximations in "built-in" functions.• Rounding errors in arithmetic floating-point operations.• Perturbations of data.The error analysis is based on linearization method. The fundamental tools of the forward error analysis are system of linear absolute and relative a prior and a posteriori error equations and associated condition numbers constituting optimal of possible cumulative round – off errors. The condition numbers enable simple general, quantitative bounds definitions of numerical stability. The theoretical results have been applied a Gaussian elimination, and have proved to be very effective means of both a prior
... Show MoreFiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al
... Show More