Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
Manuscript (Tuhfat Al-Ashaba and the Nuzha Al-Kulbab) by Ahmed bin Ibrahim Al-Hanafi Al-Suruji (d.710 AH / 1310 AD), one of the important manuscripts as an encyclopedia characterized by the diversity of its topics
As we know the transportation studies regarded as one of a very
important and difficult studies and one of its difficulties created from the
process of data updating therefore the researcher well facing many difficulties
to balancing between the old data on collecting new data.
The research present an opinion which is summarized by: can we use
the old data after we updated and used it as alternatives? Or the researcher
must collect new data to complete their research which indicate to the present
situation and some times they cant complete their studies because of the
security, economic, temporally difficulties.
The research used two kinds of data, the old data which belong to the
period (1998) and new data
Recently, new generalizations have been presented for the hyponormal operators, which are (N, k)-hyponormal operators and (h, M)-hyponormal operators. Some properties of these concepts have also been proved, one of these properties is that the product of two (N, k)-hyponormal operator is also (N, k)- hyponormal operator and the product of two (h, M)-hyponormal operators is (h, M)-hyponormal operator. In our research, we will reprove these properties by using the (l,m)-commuting operator equations, in addition to that we will solve the (l, m)-commuting operator equations for (N, k)-hyponormal operators and (h, M)-hyponormal operators.
In the present paper, a simply* compact spaces was introduced it defined over simply*- open set previous knowledge and we study the relation between the simply* separation axioms and the compactness, in addition to introduce a new types of functions known as 𝛼𝑆 𝑀∗ _irresolte , 𝛼𝑆 𝑀∗ __𝑐𝑜𝑛𝑡𝑖𝑛𝑢𝑜𝑢𝑠 and 𝑅 𝑆 𝑀∗ _ continuous, which are defined between two topological spaces.
This paper is concerned with the numerical blow-up solutions of semi-linear heat equations, where the nonlinear terms are of power type functions, with zero Dirichlet boundary conditions. We use explicit linear and implicit Euler finite difference schemes with a special time-steps formula to compute the blow-up solutions, and to estimate the blow-up times for three numerical experiments. Moreover, we calculate the error bounds and the numerical order of convergence arise from using these methods. Finally, we carry out the numerical simulations to the discrete graphs obtained from using these methods to support the numerical results and to confirm some known blow-up properties for the studied problems.
We develop the previously published results of Arab by using the function under certain conditions and using G-α-general admissible and triangular α-general admissible to prove coincidence fixed point and common fixed point theorems for two weakly compatible self –mappings in complete b-metric spaces.
A mixture model is used to model data that come from more than one component. In recent years, it became an effective tool in drawing inferences about the complex data that we might come across in real life. Moreover, it can represent a tremendous confirmatory tool in classification observations based on similarities amongst them. In this paper, several mixture regression-based methods were conducted under the assumption that the data come from a finite number of components. A comparison of these methods has been made according to their results in estimating component parameters. Also, observation membership has been inferred and assessed for these methods. The results showed that the flexible mixture model outperformed the others
... Show Moreهدف البحث إلى معرفة تقويم الكفاءة الادارية لأعضاء اللجان المشرفة على التطبيقات التدريسية في كليات التربية بجامعة بغداد من وجهة نظر التدريسيين المشرفين عليها. اعتمد البحث المنهج الوصفي التحليلي. وتكون مجتمع البحث من (162) مشرفاً على التطبيقات التدريسية من كليات التربية/ جامعة بغداد، واختيرت عينة البحث بالطريقة العشوائية البسيطة، وبلغ عدد أفراد العينة (120) مشرفاً من الكليات آنفة الذكر. وتم بناء استبانة تضمنت (35)
... Show Moreحظيت عدد من الشخصيات التاريخية ممن كان لها أثر واضح المعالم في تطور النظام الإداري والسياسي للإمبراطورية المغولية، بأهتمام عدد لا بأس به من الباحثين.