Preferred Language
Articles
/
bsj-4155
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iosr Journal Of Computer Engineering (iosr-jce)
A New Approach to DNA, RNA, and Protein Motifs Templates Visualization and Analysis via Compilation Technique
...Show More Authors

Motifs template is the input for many bioinformatics systems such codons finding, transcription, transaction, sequential pattern miner, and bioinformatics databases analysis. The size of motifs arranged from one base up to several Mega bases, therefore, the typing errors increase according to the size of motifs. In addition, when the structures motifs are submitted to bioinformatics systems, the specifications of motifs components are required, i.e. the simple motifs, gaps, and the lower bound and upper bound of each gap. The motifs can be of DNA, RNA, or Protein. In this research, a motif parser and visualization module is designed depending on a proposed a context free grammar, CFG, and colors human recognition system. GFC describes the m

... Show More
Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Experimental Investigation of Short Square Normal and Hybrid Fiber Reactive Powder Concrete Columns Subjected to Chloride Solution Attack
...Show More Authors

In this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis.  Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Sudden Transition of Pharmacy Education from Traditional to Distance Learning in the Era of COVID-19: Action Steps of a Leading Pharmacy School in Iraq
...Show More Authors

Education around the world has been negatively affected by the new coronavirus disease (COVID-19) pandemic. Many institutions had to transition to distance learning in compliance with the enforced safety measures. Distance learning might work well for settings with stable internet connections, professional technical teams, and basic implementation of technology in education. In contrast, distance learning faces serious challenges in less fortunate settings with inferior infrastructure. This report aims to shed light on the immediate action steps taken at a leading pharmacy school in Iraq to accommodate for the enforced changes in pharmacy education. The University of Baghdad College of Pharmacy went from less than minimal technology impl

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Bulk binding approach for PMIPv6 protocol to reduce handoff latency in IoT
...Show More Authors

<p>Mobility management protocols are very essential in the new research area of Internet of Things (IoT) as the static attributes of nodes are no longer dominant in the current environment. Proxy MIPv6 (PMIPv6) protocol is a network-based mobility management protocol, where the mobility process is relied on the network entities, named, Mobile Access Gateways (MAGs) and Local Mobility Anchor (LMA). PMIPv6 is considered as the most suitable mobility protocol for WSN as it relieves the sensor nodes from participating in the mobility signaling. However, in PMIPv6, a separate signaling is required for each mobile node (MN) registration, which may increase the network signaling overhead and lead to increase the total handoff latency

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Exploring Important Factors in Predicting Heart Disease Based on Ensemble- Extra Feature Selection Approach
...Show More Authors

Heart disease is a significant and impactful health condition that ranks as the leading cause of death in many countries. In order to aid physicians in diagnosing cardiovascular diseases, clinical datasets are available for reference. However, with the rise of big data and medical datasets, it has become increasingly challenging for medical practitioners to accurately predict heart disease due to the abundance of unrelated and redundant features that hinder computational complexity and accuracy. As such, this study aims to identify the most discriminative features within high-dimensional datasets while minimizing complexity and improving accuracy through an Extra Tree feature selection based technique. The work study assesses the efficac

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Chaos, Solitons &amp; Fractals
A semi-analytical iterative method for solving nonlinear thin film flow problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
The educational means used by teachers of art education in primary schools
...Show More Authors

      Education varies in terms of form and content between verbal and abstract education through the delivery of knowledge and enriching experiences through verbal communication and ephemeral learning and based on sensory experiences that provide visual and audio visualizations that make it imperative to install and retain knowledge and experience. It is obvious that meanings And the concepts grow the more tangible sensory experiences that make the process of communication highly efficient, and the more the learner's acquisition of direct sensory experiences, ie the first source is the life situations and normal circumstances of the process of communication, but if these can not be available It is necessary to a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The role of an active teacher in developing the curriculum by using educational techniqes a theoretical study
...Show More Authors

Preparing teacher occupies the attention of many thinkers and philosophers since the age of
kaldinics ( people of mesoptam / 2342 pH ) to the Islamic age where moslems philosophers
focus their attention on thought and philosophy where the philosophy of that teaching
depends on : teacher , student and family begin .
So , the issue of preparing and training teacher occupies the attention of education scientists
depending on his vital and important role in implementing of teaching policies in philosophies
and Islamic educational thought , therefore , the preparing and development of the teacher
regards as one of the basics of teaching development because of its importance in
development of teaching performance and th

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-adab Journal
Metaphors and comparisons as a means of rethinking the phenomena of the surrounding world
...Show More Authors

The article characterizes metaphors and comparisons as a means of rethinking the phenomena of the surrounding world; two directions are named within which metaphors and comparisons are studied: 1) the linguo-classification direction combines several classifications of metaphors and comparisons, which are basically focused on comparing two denotations through the meanings of word forms that are part of the trope; 2) the theoretical and conceptual direction is associated with the concept of conceptual displacement and is the basis of the theoretical and methodological study of metaphor and comparison, i.e. the modern theory of metaphor is being formed; The main attention is focused on the comparative concept of Aristotle, which postul

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref