Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
The present study aimed to use the magnetic field and nanotechnology in the field of water purification, which slots offering high efficiency to the possibility of removing biological contaminants such as viruses and bacteria rather than the use of chemical and physical transactions such as chlorine and bromine, and ultraviolet light and boiling and sedimentation and distillation, ozone and others that have a direct negative impact on human safety and the environment. Where they were investigating the presence in water samples under study Coli phages using Single agar layer method and then treated samples positive for phages to three types of magnetic field fixed as follows (North Pole - South Pole - Bipolar) and compare the re
... Show MoreReliability analysis methods are used to evaluate the safety of reinforced concrete structures by evaluating the limit state function 𝑔(𝑋𝑖). For implicit limit state function and nonlinear analysis , an advanced reliability analysis methods are needed. Monte Carlo simulation (MCS) can be used in this case however, as the number of input variables increases, the time required for MCS also increases, making it a time consuming method especially for complex problems with implicit performance functions. In such cases, MCS-based FORM (First Order Reliability Method) and Artificial Neural Network-based FORM (ANN FORM) have been proposed as alternatives. However, it is important to note that both MCS-FORM and ANN-FORM can also be time-con
... Show MoreVolunteerism is an element included in many human cultures. It represents a positive cooperative act between individuals and groups. It expresses the social value systems. As a social phenomenon, it develops in societies according to innumerous circumstances and conditions. This study uses a functional approach that assumes that volunteering performs six functions for volunteers. Namely, we assume that volunteering (1) creates a sense of protection (2) meets significant cultural values (3) improves professional status of volunteers, (4) strengthens their social relationships, (5) helps them achieve a better understanding of life, and finally, (6) enhances their outlook and self-esteem. The central aim of the study is to discuss these fun
... Show MoreIt seems that the features of the theatrical discourse , since its early establishment by the Greeks, were cultural features specifically confined to that society. Such features determined the direction of the theatrical discourse for this state instead of that state. There could be some sort of similarity among those features , nevertheless they remained within the general humanitarian framework . What achieved relatedness were those features and particularities that distinguished the theatrical community. Such features and particularities vary from one show to another. This is what we call " Local Specificity" .The Iraqi theatrical memory has always emphasized the concept of Experimentation through originality and renewal since the arr
... Show MoreThis study deals with an important area in the field of linguistics, namely person deixis.
The study aims at: (1) Describing the notion of deixis, its importance, and its place in the field
of linguistics, (2) Presenting a detailed illustration of person deixis, and (3) Conducting an
analysis of person deixis in one of Synge‟s plays Riders to The Sea according to Levinson‟s
model. The most important aim of these three is the third one (the analysis). To achieve this
aim, the researcher depends on Levinson‟s (1983) descriptive approach. According to the
descriptive approach of deixis, the category of person deixis can be defined as the encoding of
the participant roles in the speech situation. This encoding is r
Abstract:
This research aims to know the reflection of selection of employees strategy dimensions ( selection of employees strategy standards, procedures selection of employees strategy , efficiency based on a selection of employees strategy) on human capital (knowledge, skills, abilities) in a sample of Lecturers consists of (Deans and assistants and heads of departments) in ( Baghdad University) included nine colleges and university president as total sample size (54), which represent almost 50% of the total research community of 116, was used in the light of the objectives of the research descriptive and analytical approach, has been a resolution main tool for data collection as well as the interview p
... Show MoreAlthough a great deal of works has been done on the area of capital structure and dividend policy, there is still insufficient knowledge of how these policies affect stock prices. This shortcoming may have been originated from the separation between both policies when investigating their effect on stock prices. Based on this point, this research adopts a new technique (completely randomized design), to combine the effect of capital structure and dividend policy on stock prices rather than separating between them. The study used panel based regression analysis depending on the sample of 30 service and industrial Jordanian firms for the period of 2001-2010. The result of test hypotheses found the following; 1) dividend payout has a
... Show MoreLearn new methods of teaching mathematics contribute to raising the level of pupils to acquire mathematical concepts primary stage
Attempt advancement in the level of mathematics teaching for the better through the use of modern teaching strategies. The research aims at the progress in the acquisition of mathematical concepts schoolgirls after subjecting the fourth grade to teach in active learning strategies, the number of research sample (60) schoolgirl, by (30) schoolgirl experimental group and 30 pupils of the control group. Clear from the results shown the presence of a statistically significant difference between the acquisition of concepts of schoolgirls two groups (experimental and control) for the benefit of pupils of the exp
In this research, the performance of asphalt mixtures modified with polyethylene polymer (PE) by adding 2%, 4%, and 6% percentages was evaluated. Two kinds of PE are employed: Low-Density PE (LDPE) and High-Density PE (HDPE). The semi-wet mixing technique (SWM) was conducted to avoid stability issue for PE-modified binder during storage condition. Many experimental tests were conducted to evaluate the ability of these mixtures to withstand the effects of loads and moisture. The hardness index of these mixtures was also measured to determine their resistance to the effects of high temperatures without causing permanent deformations. The results showed that adding PE led to a remarkable enhancement in the performance of PE-modified mixtures.
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show More