Preferred Language
Articles
/
bsj-4155
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
المسار النموذجي لتدقيق اداء الدور الاشرافي للبنك المركزي العراقي على المصارف الخاصة على وفق معايير الاجهزة العليا للرقابة المالية والمحاسبة: بحث تطبيقي في ديوان الرقابة المالية الاتحادي
...Show More Authors

With today's rapid and full of dangers the world banking sector is one of the most vital sectors at risk, and on the supervisory bodies responsible for monitoring the work of banks to take an active role in influencing the banks and put on the right track and is compatible with internationally approved curriculum. The lie of the research problem in the weak supervisory role of the Central Bank for banks in general and private banks in particular, limited the process of performance audit carried out by the Federal Office of Financial Supervision in auditing oversight role of the Central Bank control over the banks, according to the methods of performance audit followed by the upper bodies of financial control and accounting, And it was ba

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Study of Rod-Plate DC Discharge Plasma Characteristics at Atmospheric-Pressure
...Show More Authors

     The characteristics of atmospheric-pressure glow discharge (APGD) produced by rod-plate electrodes are experimentally determined. APGD is sustained by applying a high DC voltage between the electrodes. At atmospheric pressure, the shift from corona discharge to glow discharge is investigated. A rod-plate discharges configuration's volt–ampere properties show the existence of three discharge regimes: corona, glow, and spark. The variations in the electrical field distribution in the various regimes are mirrored in the discharge luminosity. The rod-plate patterns are created under a dark region, and are visible mainly due to the effect of electrons heated by the local enhanced electric field at the interface, according to the op

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Beam Shaping Technique for 5-mm Fiber-coupled Laser Diode Bars with Lens Group
...Show More Authors

In the last few years, fiber-coupled diode lasers have shown massive applications in many fields of communication and scientific research. Particularly, the pumping of solid-state lasers is a key application for more powerful diode lasers enabling good solutions in various laser micro methods like metal cutting, sintering, structuring as well as drilling. In this work, a simple beam shaping method is demonstrated for coupling a high-power semiconductor laser diode into multi-mode fiber optic using optical lenses. The optical lenses as beam transformation components are utilized to reshape the asymmetrical irradiation of the diode laser bar and to circularize the laser beam. Using this simple method, compact, high-output-power, and high-b

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Spectroscopic Analysis of CdO1-X: SnX Plasma Produced by Nd:YAG Laser
...Show More Authors

In this work, the optical emission spectrum technique was used to analyze the spectrum resulting from the CdO:Sn plasma produced by laser Nd:YAG with a wavelength of (1064) nm, duration of (9) ns, and a focal length of (10) cm in the range of energy of 500-800 mJ. The electron temperature (Te) was calculated using the in ratio line intensities method, while the electron density (ne) was calculated using Saha-Boltzmann equation. Also, other plasma parameters were calculated, such as plasma (fp), Debye length (λD) and Debye number (ND). At mixing ratios of X=0.1, 0.3 and 0.5, the CdO1-X :SnX plasma spectrum was recorded for different energies. The change

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (13)
Scopus Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
The search for Sanctity and Divine Love « The Narrow Door » Andre Gide: À la recherche de la sainteté et de l’amour céleste dans « La porte étroite » d’André Gide.
...Show More Authors

The theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.

André Gide has revealed a protestant deviation from the perfection theme tha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 28 2018
Journal Name
2018 4th International Conference On Computer And Technology Applications (iccta)
Improving accuracy of CADx system by hybrid PCA and backpropagation
...Show More Authors

—Medical images have recently played a significant role in the diagnosis and detection of various diseases. Medical imaging can provide a means of direct visualization to observe through the human body and notice the small anatomical change and biological processes associated by different biological and physical parameters. To achieve a more accurate and reliable diagnosis, nowadays, varieties of computer aided detection (CAD) and computer-aided diagnosis (CADx) approaches have been established to help interpretation of the medical images. The CAD has become among the many major research subjects in diagnostic radiology and medical imaging. In this work we study the improvement in accuracy of detection of CAD system when comb

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Permeability Determination of Tertiary Reservoir/Ajeel Oil Field
...Show More Authors

This paper discusses the method for determining the permeability values of Tertiary Reservoir in Ajeel field (Jeribe, dhiban, Euphrates) units and this study is very important to determine the permeability values that it is needed to detect the economic value of oil in Tertiary Formation. This study based on core data from nine wells and log data from twelve wells. The wells are AJ-1, AJ-4, AJ-6, AJ-7, AJ-10, AJ-12, AJ-13, AJ-14, AJ-15, AJ-22, AJ-25, and AJ-54, but we have chosen three wells (AJ4, AJ6, and AJ10) to study in this paper. Three methods are used for this work and this study indicates that one of the best way of obtaining permeability is the Neural network method because the values of permeability obtained be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Calculating Parameters for Se and Tin Plasmas Produced by Pulsed Nd: YAG Laser
...Show More Authors

      In this study, the plasma formed by the preparation of Se and Tin (Sn) using a Nd: YAG laser with a wavelength of 1064 nm in air, which was then studied using the technique of optical emission spectrum, was presented (OES).The laser-induced plasma parameters such an electron temperature (Te) were identified using two-ratio methods, using Stark broadening methods to determine the density of electrons (ne). According to the findings, there is a correlation between the amount of laser energy that is applied and the increase in the emission intensity of the spectral lines. In the case of Se plasma, an increase in laser energy causes a rise in the temperature of the electrons. While increasing the temperature of the elec

... Show More
View Publication Preview PDF
Scopus Crossref