Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
The research summarizes the knowledge of the dimensions and denotations of T.V advertisement; and its constituents for building it through the semiotic approach of an ad sample represented by the announcement of Zain Kuwait Telecom Company which carries the title "Mr. President" using Roland Barth's approach, starting with the designation, implicit, and linguistic reading to reach the narrative features and their denotations. That makes television advertising as a semiotic and pragmatic discourse in view of the still and motion picture with its efficiency and strength to inform and communicate. And what lies in it of aesthetic, artistic elements; informational and effective power in influencing the recipients by focusing on narratives and a
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreThe present work is qualitative descriptive. It aims to examine the idiosyncratic schema when deciphering the selected violence-based panel from Nasser Ibrahim’s caricatures. The researchers accordingly adopted part of Sharifian’s (2011) Cultural Schema model, particularly that part that is concerned with the examining the micro/idiosyncratic level of understanding. The study has revealed that the participants have not only differed among themselves regarding the way a figure is being denotatively conceptualized, they also highlighted different exact conceptualizations for the same figure, such as: using various adjectives that reflect various levels of intensity, emphasizing the behavioral aspect or the appearance of the figure, ado
... Show MoreWhat we observe from the weakness of the students in some of different subjects may be due to that students are learning these traditional methods and competing to acquire the mark, and attain their teachers' interest ,then their only aim becomes the academicsuccess, and this is whatcontradicts the modern educational philosophy.
Education needs to be providing it with new ideas and methodologies toprepare an emerging demonstrated scientific reason to distance them from the tradition and indoctrination that do not create generations able to address theexpected problems.
The cognitive behavior of reflectiveincludes planning skil
... Show MoreAbstract\
In this research, estimated the reliability of water system network in Baghdad was done. to assess its performance during a specific period. a fault tree through static and dynamic gates was belt and these gates represent logical relationships between the main events in the network and analyzed using dynamic Bayesian networks . As it has been applied Dynamic Bayesian networks estimate reliability by translating dynamic fault tree to Dynamic Bayesian networks and reliability of the system appreciated. As was the potential for the expense of each phase of the network for each gate . Because there are two parts to the Dynamic Bayesian networks and two part of gate (AND), which includes the three basic units of the
... Show MoreFutsal and blind football are group games of a competitive nature due to their excitement, excitement, fun, and aesthetic goals with charming artistic touches. This explains the public's passion for these two games, whether healthy people or blind people play them, to expand their vision and knowledge. About these two games, a historical approach is presented about their origins, development, and how they became globally recognized competitive sports with unified rules and world championships at various levels. Studying the origin and global spread of both futsal and blind football and identifying the most prominent developments in the rules and tools for futsal and blind football. The most important findings were that both futsal and footb
... Show MoreThe utilization of sugarcane molasses (SCM), a byproduct of sugar refining, offers a promising bio-based alternative to conventional chemical admixtures in cementitious systems. This study investigates the effects of SCM at five dosage levels, 0.25%, 0.50%, 0.75%, 1.00%, and 1.25% by weight of cement, on cement mortar performance across fresh, mechanical, thermal, durability, and density criteria. A comprehensive experimental methodology was employed, including flow table testing, compressive strength (7, 14, and 28 days) and flexural strength measurements, embedded thermal sensors for real-time hydration monitoring, water absorption and chloride ion penetration tests, as well as 28-day density determination. Results revealed clear
... Show MoreVehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destina
... Show MoreCapital Adequacy is on of the most importance of financial position element because its role is enhance against varions risks of Banking procese . Which this risks is a result of the nature of its operations , investment , Financing tools in addition , in order to Faced any clients withdraws un expected .
So This study aim to measure The Capital Adequacy according to basel II and explin the different risk in the Islamic Bank as aresult to nature and different investment and financing tools as participation speculation , murabah and natures of its assets and liabilities related to commercial banks .
Find out we concludes that the Islamic Banks needs to increase the ca
... Show MoreIt is an established fact that substantial amounts of oil usually remain in a reservoir after primary and secondary processes. Therefore; there is an ongoing effort to sweep that remaining oil. Field optimization includes many techniques. Horizontal wells are one of the most motivating factors for field optimization. The selection of new horizontal wells must be accompanied with the right selection of the well locations. However, modeling horizontal well locations by a trial and error method is a time consuming method. Therefore; a method of Artificial Neural Network (ANN) has been employed which helps to predict the optimum performance via proposed new wells locations by incorporatin