<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>
The paper tackles two topics. The first is about the term "Ремейк" which is very common in contemporary Russian literature; it has counterparts such as " Обработка" and " Переделка", where these two may indicate any of the following meanings (remake, reformulate, rewrite, treatment, modification, change). It has been shown that this term does not have a stable definition. Also, the role of this term in literary studies has been mentioned along with how it has come to its peak of use in post-modern literature.
The second is that I have taken a sample of well-known works in Russian literature " On the Eve, On the Eve " by the contemporary Russian writer YevgueniBobov, and shown the effort of the writer
... Show MoreAn intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men
... Show Moreتم التطرق في هذا البحث الى دور الذكاء الاصطناعي والتكنولوجيا الحديثة في العملية التدريبية بما يخدم أهدافه والاستفادة منه من خلال المخرجات الجيدة، حيث ان توظيف التكنولوجيا في تدريب رياضة المبارزة يسهل العملية التدريبية على المدرب واللاعب ويساهم في تقليل الجهد المبذول والوقت المستغرق ، وهدفت الدراسة الى التعرف على تأثير الجهاز المصنع في ضبط المسافة بين القدمين لدى عينة البحث ،استخدم المنهج التجريبي بت
... Show MoreObjectives: To determine the effectiveness of the educational program on nursing staff knowledge about infection control measures at the Intensive Care Unit in Al-Diwaniya Teaching Hospital.
Methodology: A pre-experimental design (one group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from ( 20th February to 5th March, 2020) on a non-probability (purposive) sample consisting of (25 nurses) working in ICU. A questionnaire was built as a data collection tool and consisted of two parts:
First part: The demographic characteristics of the nursing staff (age, gender, level of education, years of experien
... Show MoreThe research aims to identify how to enhance the quality of the human resources, focusing on four dimensions (efficiency, effectiveness, flexibility, and reliability), by adopting an adventure learning method that combines theoretical and applied aspects at the same time, when developing human resources and is applied using information technology, and that Through its dimensions, which are (cooperation, interaction, communication, and understanding), as the research problem indicated a clear deficiency in the cognitive perception of the mechanism of employing adventure learning dimensions in enhancing human resources quality, so the importance of research was to present treatments and proposals to reduce this problem. To achieve
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreThe research aimed to identify “The impact of an instructional-learning design based on the brain- compatible model in systemic thinking among first intermediate grade female students in Mathematics”, in the day schools of the second Karkh Educational directorate.In order to achieve the research objective, the following null hypothesis was formulated:There is no statistically significant difference at the significance level (0.05) among the average scores of the experimental group students who will be taught by applying an (instructional- learning) design based to on the brain–compatible model and the average scores of the control group students who will be taught through the traditional method in the systemic thinking test.The resear
... Show MoreThe hydroconversion of Iraqi light straight run naphtha was studied on zeolite catalyst. 0.3wt.%Pt/HMOR catalyst was prepared locally and used in the present work. The hydroconversion performed on a continuous fixed-bed laboratory reaction unit. Experiments were performed in the temperature range of 200 to 350°C, pressure range of 3 to 15 bars, LHSV range of 0.5-2.5h-1, and the hydrogen to naphtha ratio of 300.
The results show that the hydroconversion of Iraqi light straight naphtha increases with increase in reaction temperature and decreases with increase in LHSV.
High octane number isomers were formed at low temperature of 240°C. The selectivity of hydroisomerization improved by increasing reaction pressu
... Show More