<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>
In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreBackground: The aim of this study was to comparatively evaluate the push out bond strength (PBS) of root canal fillings using four different obturation techniques (single cone (SC), cold lateral compaction (CLC), continuous wave (CW), and carrier based gutta percha (CBG)). Materials and Methods: Forty mandibular premolar decoronated and instrumented with rotary ProTaper to F3 then teeth were divided randomly into 4 groups of 10 teeth for each as follow: group (I) single- cone obturation with matched-taper gutta-percha, group (II) cold lateral compaction technique, group (III) continuous wave of obturation technique, and group( IV) carrier based gutta-percha technique. Zinc oxide eugenol (ZOE) sealer was used as a root canal sealer for the
... Show MoreA variety of single-engine driven files and inematics have been introduced to improve the clinical performance of NiTi rotary files. The purpose of this in vitro study was to measure and compare the incidence of dentinal defects after root canal preparation with different single file systems.
Abstract
Pneumatic processes sequence (PPS) is used widely in industrial applications. It is common to do a predetermined PPS to achieve a specific larger task within the industrial application like the PPS achieved by the pick and place industrial robot arm. This sequence may require change depending on changing the required task and usually this requires the programmer intervention to change the sequence’ sprogram, which is costly and may take long time. In this research a PLC-based PPS control system is designed and implemented, in which the PPS is programmed by demonstration. The PPS could be changed by demonstrating the new required sequence via the user by following simple series of manual steps without h
... Show MoreThe use of performance measures modern and sophisticated one of the most important factors that help organization management in achieving customer satisfaction which today is the premise of The scales cell performance and value stream performance measures that will help organization management elimination of waste in all its forms, by allowing the organization opportunities and strengths to help them in achieving their goals. as well as achieving market share and growth in sales and increase cash inflows Where research deals with the concept of lean performance and managerial and its measurement and the evolution of these measure, and the ability of these organizations to achieve customer satisfaction through the application of these mod
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreThe Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute
... Show MoreABSTRACT
Herbs and spices have long been used to support various food products, including dairy products because of their flavoring, taste, texture and general appearance as well as therapeutic properties such as antioxidant activities, infections, microbes, anti-diabetes and hypertension. Therefore, this study aimed to demonstrate the effect of adding ginger, cinnamon, lycopene extract and olive oil on the physiochemical properties, the quality of the soft cheese produced and the extent of its acceptance by the Iraqi consumer, who prefers this product in abundance to other types of cheese. So, this study was prepared
... Show More