Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet detection for information security. For effectual recognition of botnets, the proposed model involves data pre-processing at the initial stage. Besides, the model is utilized for the identification and classification of botnets that exist in the network. In order to optimally adjust the SVM parameters, the DFA is utilized and consequently resulting in enhanced outcomes. The presented model has the ability in accomplishing improved botnet detection performance. A wide-ranging experimental analysis is performed and the results are inspected under several aspects. The experimental results indicated the efficiency of our model over existing methods.
Research summary
Backbiting pronouns have gained great importance in contemporary textual linguistic studies, as they play a coordinating function in the text and link its parts.
Interpreters did not overlook the role of backbiting pronouns in achieving the function of consistency and coherence in the Qur’anic text, as they referred to this, including Ibn Ashour, who had many analytical practices related to referral issues and their complexities. The Qur'anic reference to the pronouns of backbiting, so the researcher traced these phenomena and their evidence in the Holy Qur'an, aiming to clarify their role in enriching the significance and in the coherence and harmony
... Show MoreFree radical formation in heme proteins is recognized as a factor in mediating the toxicity of many chemicals. The present study was designed to evaluate the dose-response relationship of the free radical scavenging properties of pentoxifylline in nitrite-induced Hb oxidation. Different concentrations of pentoxifylline were added at different time intervals of Hb oxidation in erythrocytes lysate, and formation of methemoglobin (MetHb) was monitored spectrophotometrically. The results showed that in this model, pentoxifylline successfully attenuates Hb oxidation after challenge with sodium nitrite; this protective effect was found to be not related to the catalytic stage of Hb oxidation, th
... Show MoreThe tourism industry has become, currently, an art, an industry and a science. It is also one of the components that make up touristic regions. Tourist attractions are no longer the exclusive visits of museums and archeological sites, but also involve other service facilities. It is, therefore, imperative that the authorities should become aware of the degradation of tourist resorts and prevent them from getting worse. Moreover, the authorities should take a set of decisions concerning the protection of the urban aspect with its historical, social, and environmental dimensions, as well as, adapting it to the modern requirements that can bring comfort to the citizens and tourists at physical and psychological levels.
It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul
... Show MoreThis study has contributed to understanding a delayed prey-predator system involving cannibalism. The system is assumed to use the Holling type II functional response to describe the consuming process and incorporates the predator’s refuge against the cannibalism process. The characteristics of the solution are discussed. All potential equilibrium points have been identified. All equilibrium points’ local stability analyses for all time delay values are investigated. The system exhibits a Hopf bifurcation at the coexistence equilibrium, which is further demonstrated. The center manifold and normal form theorems for functional differential equations are then used to establish the direction of Hopf bifurcation and the stability of the per
... Show MoreIn this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.
... Show MoreIn this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model