In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from the whole features set. Thus, it obtains efficient botnet detection results in terms of F-score, precision, detection rate, and number of relevant features, when compared with DT alone.
Twelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MoreIntroduction and Aim: Kruppel Like Factor 14 (KLF14) gene plays an important role in metabolic illnesses and is also involved in the regulation of many other biological processes. This study's objective was to determine whether or not the KLF14 single-nucleotide-polymorphism (SNP) known as rs972283 was linked to an increased risk of peptic ulcer disease in the population that was being investigated. Materials and Methods: Participants in this study included 71 people who had been diagnosed with peptic ulcers and 50 people who were considered to be healthy controls. In order to genotype the KLF14 SNP rs972283, an amplification refractory mutation system-polymerase chain reaction (ARMS-PCR) was carried out, and the PCR results were
... Show MoreThe role of transmembrane protease serine 2(TMPRSS2) in prostate carcinogenesis relies on overexpression of ETS transcription factors. The aim of this article was to investigate the association of TMPRSS2 polymorphism (rs12329760 (C\T)) with prostate cancer (PCa) in sample of Iraqi patients. One hundred and two individuals were involved in this study for the period from February – 2019 to February – 2020. The sample type was formalin fixed paraffin embedded tissue samples (FFPE), which involved fifty-six samples of pre-diagnosed patients with prostate cancer, aged between 48 and 86 years, and forty-six samples were found to be controls (healthy group) dependent on Prostate Gland integrity, which is the same age as in a group o
... Show MoreCommon walnut (
Many of accurate inertial guided missilc systems need to use more complex mathematical calculations and require a high speed processing to ensure the real-time opreation. This will give rise to the need of developing an effcint
Some maps of the chaotic firefly algorithm were selected to select variables for data on blood diseases and blood vessels obtained from Nasiriyah General Hospital where the data were tested and tracking the distribution of Gamma and it was concluded that a Chebyshevmap method is more efficient than a Sinusoidal map method through mean square error criterion.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThere is a great deal of systems dealing with image processing that are being used and developed on a daily basis. Those systems need the deployment of some basic operations such as detecting the Regions of Interest and matching those regions, in addition to the description of their properties. Those operations play a significant role in decision making which is necessary for the next operations depending on the assigned task. In order to accomplish those tasks, various algorithms have been introduced throughout years. One of the most popular algorithms is the Scale Invariant Feature Transform (SIFT). The efficiency of this algorithm is its performance in the process of detection and property description, and that is due to the fact that
... Show More