Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
يهدف البحث إلى تحضير سلسلة من معقدات العناصر الانتقالية ثنائية التكافؤ(المنغنيز, الكوبلت, النيكل, الخارصين والكادميوم) مع المركب الجديد(KL) والمشتق من تفاعل ثنائي كبريتيد الكاربون و المركب الوسطي (HD). شخصت المعقدات ذات الصيغة العامة[M(L)2] بواسطة طيف الرنين النووي المغناطيسي البروتوني والكربوني للمركب الجديد وقياسات الأشعة تحت الحمراء والطيف الإلكتروني ودرجات الانصهار و التوصيلية المولارية و ت
... Show MoreAbstract
The research aims to determine the role of the efficiency of Human Resources Information System in the effectiveness of Employees Performance Appraisal System in the Ministry of Higher Education and Scientific Research / Center for the ministry, it was touching the researchers need the ministry to devise methods that employ outputs Human Resources Information System in the organization surveyed for the development of methods and levels of process evaluate the performance of its employees, in order to identify the extent of the role played by human resources information system in the process of assessing the performance of employees, we raised the question of the President as follows:
... Show MoreIn our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.
Continuous functions are novel concepts in topology. Many topologists contributed to the theory of continuous functions in topology. The present authors continued the study on continuous functions by utilizing the concept of gpα-closed sets in topology and introduced the concepts of weakly, subweakly and almost continuous functions. Further, the properties of these functions are established.
Low-dimensional materials have attracted significant attention in developing and enhancing the performance of quantum well lasers due to their extraordinary unique properties. The optical confinement factor is one of the most effective parameters for evaluating the optimal performance of a semiconductor laser diode when used to measure the optical gain and current threshold. The optical confinement factor and the radiative recombination of single quantum wells (SQW) and multi-quantum wells (MQW) for InGaAsP/InP have been theoretically studied using both radiative and Auger coefficients. Quantum well width, barrier width, and number of quantum wells were all looked at to see how these things changed the optical confinement factor and
... Show MoreDrawbacks of Implementing Electronic Management in the Ministry of Education (A sample: Oman Educational Portal) from the Point of View of IT Staff. The study aimed at discovering the drawbacks of implementing electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff, and that is by answering the following questions: - What are the main drawbacks (administrative, financial, technical and drawbacks related to human resources) that hinder implementing the electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff? - Are there any statistical significance differences at the level (0.05) between study samples on the
... Show More A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.
The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a
... Show MoreThere is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into
... Show MoreThe Braille Recognition System is the process of capturing a Braille document image and turning its content into its equivalent natural language characters. The Braille Recognition System's cell transcription and Braille cell recognition are the two basic phases that follow one another. The Braille Recognition System is a technique for locating and recognizing a Braille document stored as an image, such as a jpeg, jpg, tiff, or gif image, and converting the text into a machine-readable format, such as a text file. BCR translates an image's pixel representation into its character representation. As workers at visually impaired schools and institutes, we profit from Braille recognition in a variety of ways. The Braille Recognition S
... Show More