<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>
SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023
Objective: Assess type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot. Find out the relationship between of type 2 diabetic patients’ knowledge regarding preventive measures of diabetic foot with certain sociodemographic characteristics
Methodology: A descriptive study was carried out from (2nd January 2022 to 26th March 2022). A non –probability (purposive) sample of (60) adult patients who are diagnosed with type2 diabetes mellitus these patients have met the study criteria which was selected from Imam AL-Hussein Medical-City. The study instrument consist of two section: (Demographic Information Sheet, and Foot Care Outcome Expectation
... Show MoreThe present study attempts to determine the effect of freezing for different periods on preserved bodies of fish in the laboratory to keep for the research and diagnosis of taxonomic studies and not for consumption. It also endeavors to identify the effect of freezing on some morphometric features of the preserved bodies of fishes. Planiliza abu fish were used to conduct the present study. Fish were frozen by regular freezing in the home refrigerator freezer with temperatures reaching four degrees centigrade below zero. Freezing time is distributed over four months; biometric measurements of frozen fish have been taken in these periods represented by body total length, Standard length, and Head length in centimeters using a ruler ve
... Show MoreDuring a survey on the helminthic parasites of three species of turtles in the north part of Iraq, five species of nematodes were recorded for the first time in Iraq. They were all found in the intestine. These are, Camallanus microcephalus (Dujardin, 1845) recorvered from the turtle Clemmys caspica; Spironoura japonensis (Yamaguti, 1935) from Triopyx eup¬hraticus and Angusticaecum holopterum (Rudolphi, 1819), and Tachygonetria nicollei (Seurat, 1918) from the turtle Testudo graeca. All of the localities and hosts are newly recorded in Iraq.
CD-nanosponges were prepared by crosslinking B-CD with diphenylcarbonate (DPC) using ultrasound assisted technique. 5-FU was incorporated with NS by freeze drying, and the phase solubility study, complexation efficiency (CE) entrapment efficiency were performed. Also, the particle morphology was studied using SEM and AFM. The in-vitro release of 5-FU from the prepared nanosponges was carried out in 0.1N HCl.
5-FU nanosponges particle size was in the nano size. The optimum formula showed a particle size of (405.46±30) nm, with a polydispersity index (PDI) (0.328±0.002) and a negative zeta potential (-18.75±1.8). Also the drug entrapment efficiency varied with the CD: DPC molar ratio from 15.6 % to 30%. The SEM an
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show More