Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet detection for information security. For effectual recognition of botnets, the proposed model involves data pre-processing at the initial stage. Besides, the model is utilized for the identification and classification of botnets that exist in the network. In order to optimally adjust the SVM parameters, the DFA is utilized and consequently resulting in enhanced outcomes. The presented model has the ability in accomplishing improved botnet detection performance. A wide-ranging experimental analysis is performed and the results are inspected under several aspects. The experimental results indicated the efficiency of our model over existing methods.
Prostate cancer is the commonest male cancer and the second leading cause of cancer-related death in men. Over many decades, prostate cancer detection represented a continuous challenge to urologists. Although all urologists and pathologists agree that tissue diagnosis is essential especially before commencing active surgical or radiation treatment, the best way to obtain the biopsy was always the big hurdle. The heterogenicity of the tumor pathology is very well seen in its radiological appearance. Ultrasound has been proven to be of limited sensitivity and specificity in detecting prostate cancer. However, it was the only available targeting technique for years and was used to guide biopsy needle passed transrectally or transperineally
... Show MoreThe Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats. This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat
... Show MoreObjective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th
... Show MoreObjective: Develop a deliberate thinking scale for the setting skill in volleyball for second-year female students in the College of Physical Education and Sports Sciences for Woman. Research methodology: The researchers used the experimental approach, employing a two-group approach (pre-test and post-test), to suit the nature of the research. The research community comprised (65) second-year female students from the College of Physical Education and Sports Sciences for Woman at the University of Baghdad for the academic year 2024-2025. The research sample was randomly selected, with (15) students in Section A, the experimental group, and (15) students in Section B, the control group. This group represented (46%) of the students. Th
... Show MoreThe research seeks to identify the impact of fraud detection skills in the settlement of compensatory claims for the fire and accident insurance portfolio and the reflection of these skills in preventing and reducing the payment of undue compensation to some who seek profit and enrichment at the expense of the insurance contract. And compensatory claims in the portfolio of fire and accident insurance in the two research companies, which show the effect and positive return of the detection skills and settlement of the compensation on the amount of actual compensation against the claims inflated by some of the insured, The research sample consisted of (70) respondents from a community size (85) individuals between the director and assistan
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreIn this paper, a discrete SIS epidemic model with immigrant and treatment effects is proposed. Stability analysis of the endemic equilibria and disease-free is presented. Numerical simulations are conformed the theoretical results, and it is illustrated how the immigrants, as well as treatment effects, change current model behavior
This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
- The sandy soil with high gypsum content (usually referred to as gypseous soil) covers vast area in south, east, middle and west regions of Iraq, such soil possess a type of cohesive forces when attached with optimum amount of water, then compacted and allowed to cure, but losses its strength when flooded with water again. Much work on earth reinforcement was published which concentrate on the gain in bearing capacity in the reinforced layer using different types of cohesive or cohesion less soil and various types of reinforcement such as plastic, metal, grids, and synthetic textile. Little attention was paid to there enforce gypseous soil. The objective of this work is to study the interaction between such soil and reinforcement strips
... Show More