Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MorePerhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec
... Show MoreWhich was entitled : Aesthetic and dramatic dimensions of silence in the feature film , and the researcher clearly define after removing the confusion existing in some authorized sources , as for the concept of silence , adopted in this research is : the death of the audio stream , Hence the researcher shed a light on the aesthetic and the dramatic role of silence in the feature film , through the handing of the silent scenes ( absolute silence ) in the film research divided this research into four chapters . This first Chapter includes : methodological framework , which represents the research problem , which came with the following question : what is the mechanism of productive silence to the
... Show MoreThe topic of research (women and ideology in the feature film) is a series of researches addressed by the researcher on the subject of women in the feature film through studying the ideology as a thought and political system not only limited to the world of men, but women had a significant contribution in this area. The research identified the problem and its need as well as the objectives of the research and clarified its limits and importance. The research also identified the theoretical framework, which included the following axes: personality and ideology, film and ideology, then women and ideology in the film.
After the completion of the theoretical framework, the research concluded a set of indicators of the theoretic
... Show MoreAccording to different types of democracy Indexes, hybrid regimes or those in the gray zone, make up the majority of regime transformations in the third wave of democracy. However, after nearly three decades, conceptual confusion about hybrid regimes persists and grows, while obstructing the accumulation of knowledge about the nature of hybrid regimes. This leads to significant political repercussions for democratization. This Paper attempts to provide a clearer view of different and overlapping concepts and classifications in this complex field, and sustain development in literature on democratic transformation. To achieve this, we followed an approach based on the classification of concepts and terms in three distinct categories, b
... Show MoreThe purpose of the current study was to explore the standards that teachers take into consideration when selecting and using assistive technology (AT), in addition to their knowledge and skills in this area. A quantitative, descriptive survey design was used and a convenience sample of 79 teachers of students with intellectual disabilities and autism spectrum disorder (ASD) participated in the current study. Based on the four main areas of the SETT Framework—student, environment, tasks, and tools—, teachers reported a lack consideration for most of the standards in each area. Among other findings, statistically significant differences were found between teachers’ standards of the SETT Framework, with teachers who had previous profe
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThis paper describes the problem of online autonomous mobile robot path planning, which is consisted of finding optimal paths or trajectories for an autonomous mobile robot from a starting point to a destination across a flat map of a terrain, represented by a 2-D workspace. An enhanced algorithm for solving the problem of path planning using Bacterial Foraging Optimization algorithm is presented. This nature-inspired metaheuristic algorithm, which imitates the foraging behavior of E-coli bacteria, was used to find the optimal path from a starting point to a target point. The proposed algorithm was demonstrated by simulations in both static and dynamic different environments. A comparative study was evaluated between the developed algori
... Show MoreData Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show More