Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
The increasing rates of consumption of cigarettes harmful, to health in the world in general, and in Iraq in particular, and because of the costs borne by individuals, and the state as a result of addressing its damage, as well as Iraq's commitment, to international conventions against cigarettes, and demands of the World Health Organization, to raise prices to reduce consumption. Therefore, the tax Selectivity is one of the most important ways of regulating the consumption of this commodity on the one hand and increasing the tax revenue on the other. The research aims to shed light on the issue of selective tax on cigarettes and the impact of their application in increasing tax revenues and identify the effectiveness of the application
... Show Moreتحضيروتشخيص ودراسة طيفية وحرارية وبيولوجية للمركب الجديد والمشتق من 2-امينوبينزوثايوزول واستخدامه كمثبط لتأكل سبيكة (-brass) في أنابيب مياه الشرب مع بعض المعقدات الفلزية
استخلص عامل التلزن من E. faecalis EM1 بعد تكسير الخلايا بعدة طرق واختيار الطريقة التي تعطي اعلى قيمة تلزن والترسيب بالكحول الاثيلي , واجري فحص التلزن وقياسه للمستخلص مع انواع من البكتريا السالبة لملون غرام تضمنت Escherichia coli و Klebsiella pneumoniae و Serratia
Islamic manuscripts are considered an identity for the civilizational, cognitive and cultural development of nations and the Islamic world as a whole, and to identify this identity
The research seeks to clarify the problems related to the aspects of the financial and accounting process resulting from entering into contractual arrangements with a period of more than 20 years, among which is the research problem represented by the lack of clarity of the foundations and procedures for the recognition of oil costs and additional costs borne by foreign invested companies, which led to a weakening of their credibility and reflection. Negatively "on the measurement and accounting disclosure of financial reports prepared by oil companies, and the research aims to lay down sound procedures for measuring and classifying oil costs and additional costs paid to foreign companies, and recognizing and recording them in th
... Show MoreThe scholars of Iraq in the modern and contemporary era have been interested in the definition of tremendous knowledge treasures left by the successive Iraqi civilizations on Mesopotamia and around the cities, through the census and extrapolation of manuscript heritage and even printed, they compiled indexes,evidence
Islamic manuscripts are considered an identity for the civilizational, cognitive and cultural development of nations and the Islamic world as a whole, and to identify this identity, the closing statement usually written at the end of the manuscript helps us with this, meaning that the closing entries serve as the identity document of the manuscript
Ensuring reliable data transmission in Network on Chip (NoC) is one of the most challenging tasks, especially in noisy environments. As crosstalk, interference, and radiation were increased with manufacturers' increasing tendency to reduce the area, increase the frequencies, and reduce the voltages. So many Error Control Codes (ECC) were proposed with different error detection and correction capacities and various degrees of complexity. Code with Crosstalk Avoidance and Error Correction (CCAEC) for network-on-chip interconnects uses simple parity check bits as the main technique to get high error correction capacity. Per this work, this coding scheme corrects up to 12 random errors, representing a high correction capac
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show More