Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreThere are large numbers of weakness in the generated keys of security algorithms. This paper includes a new algorithm to generate key of 5120 bits for a new proposed cryptography algorithm for 10 rounds that combine neural networks and chaos theory (1D logistic map). Two methods of neural networks (NN) are employed as Adaline and Hopfield and the results are combined through several sequential operation. Carefully integrating high quality random number generators from neural networks and chaos theory to obtain suitable key for randomness and complexity.
The diagnoses system of varicose disease has a good level of performance due to the complexity and uniqueness in patterns of vein of the leg. In addition, the patterns of vein are internal of the body, and its features are hard to duplicate, this reason make this method not easy to fake, and thus make it contains of a good features for varicose disease diagnoses. The proposed system used more than one type of algorithms to produce diagnoses system of varicose disease with high accuracy, in addition, this multi-algorithm technique based on veins as a factor to recognize varicose infection. The obtained results indicate that the design of varicose diagnoses system by applying multi- algorithms (Naïve Bayes and Back-Propagation) produced n
... Show MoreForm the series of generalization of the topic of supra topology is the generalization of separation axioms . In this paper we have been introduced (S * - SS *) regular spaces . Most of the properties of both spaces have been investigated and reinforced with examples . In the last part we presented the notations of supra *- -space ( =0,1) and we studied their relationship with (S * - SS *) regular spaces.
In this article, the solvability of some proposal types of the multi-fractional integro-partial differential system has been discussed in details by using the concept of abstract Cauchy problem and certain semigroup operators and some necessary and sufficient conditions.
الملخص: تعد عناصر اللياقة البدنية العمود الفقري للألعاب الرياضية وخصوصا في الالعاب الجماعية ومنها لعبة كرة القدم للصالات والتي تعد من الالعاب الرياضية التي تتطلب بذل جهود كبيرة خلال المنافسة نظرا لطبيعة الاداء الذي يمتاز بالقوة والسرعة طيلة شوطي المباراة وهذا يتطلب من اللاعب امتلاكه للياقة بدنية عالية تؤهله للإيفاء بهذه المتطلبات خلال المنافسة، لذا نجد المدربين يتبعون كافة الاساليب وطرائق التدريب في سب
... Show Moreملخص البحث: يعد اسلوب تدريب المقاومات المرنة واحد من اساليب تدريب القوة العضلية فهو النظام الذي يتم من خلاله استخدام تمرينات يتم ادائها ضد مقاومات متغيرة مثل الحبال المطاطية او اشرطة الساندو، ويمتاز هذا الاسلوب بتغير الشدة خلال اداء التمرين الواحد اي ان كلما تم مط الحبل المطاطي ازدادت مقاومته وبالتالي فان اللاعب يستخرج قوته اكثر كلما اقترب الى مركزية الحركة في التمرين وهذا هو جوهر الاختلاف بينه وبين استخد
... Show MoreThe research aims to achieve a manuscript of Imam Al-Ghazali, may God have mercy on him, verify the attribution of this manuscript to the author, copy the text and serve it in a manner that suits the principles of scientific research in the investigation of manuscripts