Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
With the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreIn this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.
Laser etching may be an alternative to acid etching of enamel and dentin. Several characteristics of irradiated dental hard tissues have been considered advantageous, microscopically rough surfaces without demineralization, open dentinal tubules without smear layer production and dentin surface sterilization. The aim of this study is to determine and compare histology the microleakage in class V cavity restored with a light cured composite after conditioning the samples(tooth surface) with 1-acid etching, 2-Q-switched Nd:YAG Laser etching and finally 3- acid and laser etching. Materials and methods: Twenty four non carious human extracted teeth were used in this study. The samples were equally grouped into four groups of six teeth each.
... Show MoreResearch questions start from the fact that what the Arab origins of education indicted . First question are :
- To what extent the subject of assets acquired a specific meaning in the Arabic books and educational subjects ? Is these selections are reflected on the classification of assets and their types ?
- What’s the nature of the content ? .Is there a consistency between the meaning and content ?
- What entrances handling and curriculum approach and tactics are in those books ?
- Is the assets subject introduced within the grade best suited ?
&nb
... Show Moreيهدف هذا البحث إلى تأصيل الإستدلال بالقاعدة العقائدية، وبيان ضوابطه، وإبراز نماذج من أهم تطبيقاته المعاصرة، وقد أعتمد مناهج من أهمها المنهج الإستقرائي والمنهج المقارن ، وتناول البحث التعريف لقصص النبوة فى الأديان السماوية ، وعرض بعض الدراسات السابقة التى تناولت نفس الموضوع ، ثم تطرق البحث لذكر نماذج من قصص الأنبياء من الديانات السماوية الثلاث ، وتوصل البحث الى أن الأديان السماوية رغم بعض الإختلاف
... Show Moreتهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا
... Show MoreThis research is an attempt to study and evaluate the maintenance function at Factory 7 - The State General Company for Leather Industries, and to design a computerized preventive maintenance system to design and to analyze preventive maintenance. To accomplish the objectives of this research, data were gathered and analyzed according to the reliability engineering criteria for the period 2/1– 30/6/2005, then a preventive maintenance plan was designed for each machine of the sample study using the computerized system designed in this research. A Monte Carlo Simulation methodology was used for the purpose of evaluating the performance of the preventive maintenance plan of each machine for one year. The simulation res
... Show MoreThe name of princesses Ashraf Bhlwi was associated with very important events influnced on social polical Iranian fact through second half of twentieth century, with access Dr.Mosaddeq to cabinet on May 1951, The conflict seemed between him and princesses Ashraf in creasingly, when Mosaddeq came to authority he had many projects deal with oil industry laws in Iran and reform the elections laws, reducing terms of reference of Al shah and made it honorable only, This matter disturbance Royal court especially, Ashraf, she started to coordinate with members of the shura council and other military personalities in order to over throw Mosaddeq cabinet but she failed because Mosaddeq supported by Irani
... Show MoreThe research aims to know The Effect Of Flexible Grouping Strategy and Three Step Interview strategy on achievement of the history material among student of the first literary class, The Researcher used the experimental design of the two experimental groups and the control group and with post test, researcher group (a) represent the experimental group taught according the Flexible Grouping Strategy , and Division (c) to represent the second experimental group which studied according Three Step Interview strategy and Division (b ) to represent the control group taught in the traditional method, the number of students (99) students of (33) female students in each division. T
... Show More