<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreTwelve compounds containing a sulphur- or oxygen-based heterocyclic core, 1,3- oxazole or 1,3-thiazole ring with hydroxy, methoxy and methyl terminal substituent, were synthesized and characterized. The molecular structures of these compounds were performed by elemental analysis and different spectroscopic tequniques. The liquid crystalline behaviors were studied by using hot-stage optical polarizing microscopy and differential scanning calorimetry. All compounds of 1,4- disubstituted benzene core with oxazole ring display liquid crystalline smectic A (SmA) mesophase. The compounds of 1,3- and 1,4-disubstituted benzene core with thiazole ring exhibit exclusively enantiotropic nematic liquid crystal phases.
Abstract
The intellectual capital an important variable in the equation of the success of seeking economic units to achieve a competitive advantage, since it is a real capital for economic unity it constitutes a strategic importance as the main source to achieve high profitability in the economic unit and highlights the importance of showing intellectual capital components of the main Represent of human capital and structural capital and relational capital, through effective and the prominent role played by intellectual capital within the economic unity in order to achieve a sustainable competitive advantage contribute to attracting investors with longer investment decision of the most important and difficult decisions ta
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThe study objectives were to 1) explore the real-world experience of hospital pharmacists with the differences in effectiveness safety, and interchangeability between biosimilar medicines and their reference biological counterparts, 2) reveal pharmacist recommendations to enhance the safety of biopharmaceutical medicines in public hospitals.
The study has a mixed-method design where the core component was qualitative (interviews) and the supplemental component was quantitative (adverse drug reaction, ADR, reports). This qualitative component included semi-structured (mostly face-to-face) interviews involving hospital pharmacists from different hospitals with experience with biological or biosimilar medicines. The interviews were c
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreEmergency vehicle (EV) services save lives around the world. The necessary fast response of EVs requires minimising travel time. Preempting traffic signals can enable EVs to reach the desired location quickly. Most of the current research tries to decrease EV delays but neglects the resulting negative impacts of the preemption on other vehicles in the side roads. This paper proposes a dynamic preemption algorithm to control the traffic signal by adjusting some cycles to balance between the two critical goals: minimal delay for EVs with no stop, and a small additional delay to the vehicles on the side roads. This method is applicable to preempt traffic lights for EVs through an Intelli
A new and hybrid deep learning-based approach for diagnosing faults in electric vehicle (EV) drive motors is proposed in this article. This article presents a new and hybrid deep learning-based method of diagnosing faults in the drive motors of electric vehicles (EV). In contrast to standard CNNLSTM approaches that depend on SoftMax classification, the introduced framework combines a Random Forest (RF) classifier to enhance the generalization, interpretability, and robustness of fault prediction. Furthermore meant for use on edge computing equipment with IoT integration, the design allows for real-time monitoring in resource-limited settings. The introduced algorithm utilizes a Random Forest (RF) classifier for accurate fault classification
... Show More