In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from
... Show MoreIn the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreIn the United States, the pharmaceutical industry is actively devising strategies to improve the diversity of clinical trial participants. These efforts stem from a plethora of evidence indicating that various ethnic groups respond differently to a given treatment. Thus, increasing the diversity of trial participants would not only provide more robust and representative trial data but also lead to safer and more effective therapies. Further diversifying trial participants appear straightforward, but it is a complex process requiring feedback from multiple stakeholders such as pharmaceutical sponsors, regulators, community leaders, and research sites. Therefore, the objective of this paper is to describe three viable strategies that can p
... Show More
The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla
... Show MoreAt the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreMost Internet-tomography problems such as shared congestion detection depend on network measurements. Usually, such measurements are carried out in multiple locations inside the network and relied on local clocks. These clocks usually skewed with time making these measurements unsynchronized and thereby degrading the performance of most techniques. Recently, shared congestion detection has become an important issue in many computer networked applications such as multimedia streaming and
peer-to-peer file sharing. One of the most powerful techniques that employed in literature is based on Discrete Wavelet Transform (DWT) with cross-correlation operation to determine the state of the congestion. Wavelet transform is used as a de-noisin
Background: Antibiotic resistance is a problem leading to difficulty in treating microbial infections thatmay occur due to many causes. For the important pharmacist role as a reference for the information and theability to access to medications, they are vital members in lowering the development of antibiotic resistance,and also they support the proper use and control of antibioticsmisuse. Our goal is comparing the knowledge,attitude, practice of undergraduate and postgraduate pharmacy students and their perceptions about thecausing factors of antibiotic resistance in Iraq.Method: A cross sectional study was conducted involving the final year bachelor and postgraduate (masterand Philosophical doctor) students from different private
... Show MoreABSTRACT Purpose: The determination of standard scores and levels for some mental skills by researchers is of great importance, especially if it matches the target research sample, Method: as the researchers used the descriptive approach in the survey method, and the researchers chose the sample of youth players for clubs for the season (2022-2021), numbering (127) players, and the researchers identified the scale and procedures and applied it to the research sample, Results: obtained the results that were processed, extracted grades and standard levels, and then interpreted them and obtained conclusions, Conclusion: the most important of which are: The standard levels of mental skills reached the results of the sample studied within the
... Show More