Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe research aimed at identifying the effect of the think, pair, and share strategy by using educational movies on learning jumping opened legs and closed legs skills on vault in artistic gymnastics for women. It also aimed at identifying the group that learned better the skills understudy. The researcher used the experimental method on second-grade College of Physical Education and Sport Sciences female students. Twelve female students were selected from each of the two sections to form the subjects of the study. The main program was applied for eight weeks with one learning session per week. The data was collected and treated using SPSS to conclude that the think, pair, and share strategy and the traditional program have positive effects
... Show MoreThe current research focuses on the extent to which the strategic orientation(entrepreneurial orientation, customer orientation, technology orientation, learning orientation, and investment orientation) affects the learning organization (building common vision, systemic thinking, personal dominance, mental models, team learning)The first hypothesis to test the connection relation between research variables and The second hypothesis was to test the relationship between these variables. In order to ascertain the validity of the hypotheses, the research was based on a questionnaire questionnaire prepared according to a number of In addition to building a fifth sub-variable for the strategic orientation (investment orientation) based
... Show MoreTwelve pends were selected and distributed on three verticals transects paths on the Tigers river in Al Rasheed county.Passing through land covers, that classified and covers the whole region. Based on the 8 Landsat of the year 2015. It was oriental classified by using Erdas 10.2 . The pedons were distributed on the area of each varicty of these classes. the series of soil according of the transect series (DW74,MMg,DMu6 , Df96) respectively were represented P1 , P2 , P3 , P4 .
The second transits series(DM97,MM5,DM96,DF115) respectively were represented P5 , P6 , P7 , P8 .The third transits series(DM46,MMg,MF12,MM11) re
... Show MoreThis study aimed at indicators of technical analysis and their impact on a group of trading stock indices related to it, by standing on the methods used in technical analysis and its various models, diagnosing the obstacles and difficulties that the participants face in predicting stock prices, and proposing solutions and recommendations to overcome and overcome them. From a scientific and practical perspective.
Where the research community consisted of (25) Iraqi private commercial banks, while the research sample consisted of (3) banks with a percentage of (12%) of the research community. The study used the analytical approach to the financial statements during the period between (1/2/ 2022-30/4/2022),
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More 
        