Preferred Language
Articles
/
bsj-4155
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
الاديب الكاتب والمؤرخ الفقيه يحيى بن خلدون (ت 780هـ/ 1379م) كاتب ديوان الانشاء في دولة بني زيان (633-962هـ/ 1235-1554م) بتلمسان
...Show More Authors

    A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.

    The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ? W ? M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of ri

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Some Results on Weak Essential Submodules
...Show More Authors

Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Baghdad Science Journal
S-maximal Submodules
...Show More Authors

Throughout this paper R represents a commutative ring with identity and all R-modules M are unitary left R-modules. In this work we introduce the notion of S-maximal submodules as a generalization of the class of maximal submodules, where a proper submodule N of an R-module M is called S-maximal, if whenever W is a semi essential submodule of M with N ⊊ W ⊆ M, implies that W = M. Various properties of an S-maximal submodule are considered, and we investigate some relationships between S-maximal submodules and some others related concepts such as almost maximal submodules and semimaximal submodules. Also, we study the behavior of S-maximal submodules in the class of multiplication modules. Farther more we give S-Jacobson radical of rings

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Efficient Iterative Methods for Solving the SIR Epidemic Model
...Show More Authors

In this article, the numerical and approximate solutions for the nonlinear differential equation systems, represented by the epidemic SIR model, are determined. The effective iterative methods, namely the Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM), and the Banach contraction method (BCM), are used to obtain the approximate solutions. The results showed many advantages over other iterative methods, such as Adomian decomposition method (ADM) and the variation iteration method (VIM) which were applied to the non-linear terms of the Adomian polynomial and the Lagrange multiplier, respectively. Furthermore, numerical solutions were obtained by using the fourth-orde Runge-Kutta (RK4), where the maximum remaining errors showed th

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
W-Closed Submodule and Related Concepts
...Show More Authors

    Let R be a commutative ring with identity, and M be a left untial module. In this paper we introduce and study the concept w-closed submodules, that is stronger form of the concept of closed submodules, where asubmodule K of a module M is called w-closed in M, "if it has no proper weak essential extension in M", that is if there exists a submodule L of M with K is weak essential submodule of L then K=L. Some basic properties, examples of w-closed submodules are investigated, and some relationships between w-closed submodules and other related modules are studied. Furthermore, modules with chain condition on w-closed submodules are studied.   

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 30 2018
Journal Name
Journal Of Engineering
Accuracy Assessment of Stonex X-300 Laser Scanner Cameras
...Show More Authors

Assessment the actual accuracy of laboratory devices prior to first use is very important to know the capabilities of such devices and employ them in multiple domains. As the manual of the device provides information and values in laboratory conditions for the accuracy of these devices, thus the actual evaluation process is necessary.

In this paper, the accuracy of laser scanner (stonex X-300) cameras were evaluated, so that those cameras attached to the device and lead supporting role in it. This is particularly because the device manual did not contain sufficient information about those cameras.

To know the accuracy when using these cameras in close range photogrammetry, laser scanning (stonex X-300) de

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
Performance Improvement for Wireless Sensor Networks
...Show More Authors

In this paper, we prove that our proposed localization algorithm named Improved
Accuracy Distribution localization for wireless sensor networks (IADLoc) [1] is the
best when it is compared with the other localization algorithms by introducing many
cases of studies. The IADLoc is used to minimize the error rate of localization
without any additional cost and minimum energy consumption and also
decentralized implementation. The IADLoc is a range free and also range based
localization algorithm that uses both type of antenna (directional and omnidirectional)
it allows sensors to determine their location based on the region of
intersection (ROI) when the beacon nodes send the information to the sink node and
the la

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref