Preferred Language
Articles
/
bsj-4155
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Developing a Prosthesis Design using A Gearbox to Replicate the Human Hand Mechanism
...Show More Authors

Prosthetic is an artificial tool that replaces a member of the human frame that is  absent because of ailment, damage, or distortion. The current research activities in Iraq draw interest to the upper limb discipline because of the growth in the number  of amputees. Thus, it becomes necessary to increase researches in this subject to help in reducing the struggling patients.  This paper describes the design and development of a prosthesis for people able and wear them from persons who have amputation in the hands. This design is composed of a hand with five fingers moving by means of a gearbox ism mechanism. The design of this artificial hand has 5 degrees of freedom. This artificial hand works based on the principle of &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of The College Of Education For Women
Silence as a Means of Communication in Harold Pinter’s The Caretaker
...Show More Authors

Harold Pinter’s The Caretaker(1959) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Harold Pinter to use a lot of pauses and silences in all the plays he wrote instead of words. Samuel Beckett preceded Pinter in doing so in his plays and one way to express the bewilderment of modern man during the 20th century is through the use of no language in the dramatic works. Language is no more important to modern man; instead, he uses silence to express his feelings. Silence is more powerful than the words themselves. That’s why long and short pauses can be seen throughout all Pinter’s plays.

In this play, th

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 02 2019
Journal Name
The Fifth Conference On Smart Monitoring, Assessment And Rehabilitation Of Civil Structures Smar 2019
Rehabilitation of Mohammed Al-Qassim Bridge after Fire Attack Using CFRP Sheets: A Case Study
...Show More Authors

View Publication
Publication Date
Sun Mar 28 2021
Journal Name
Journal Of The College Of Education For Women
Social Protection and its Impact on the Cohesion of Vulnerable Groups: A Field Study of a Sample Social Protection Network Beneficiaries: دينا داود محمد المولى
...Show More Authors

Social protection meets different aspects of the needs of vulnerable groups, such as the economic, health, education, and family relations and ties in the Iraqi society. This is because vulnerable groups have suffered from social and economic influences that have negative implications on the social reality as a whole. Poverty is a case in point, which paved the way to frequent setbacks that have led to social structure instability. Accordingly, the present study aims to examine the role and effect of the Net of Social Protection Program in equally distributing social protection to curb or mitigate any negative consequnces that might happen to the poor segments and vulnerable people, who are succeptible to shocks, such as: the orphans, un

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
K-Nearest Neighbor Method with Principal Component Analysis for Functional Nonparametric Regression
...Show More Authors

This paper proposed a new  method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates  are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It  utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA))  for measureing the closeness between curves.  Root Mean Square Errors is used for the  implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when  the cov

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
WOAIP: Wireless Optimization Algorithm for Indoor Placement Based on Binary Particle Swarm Optimization (BPSO)
...Show More Authors

Optimizing the Access Point (AP) deployment has a great role in wireless applications due to the need for providing an efficient communication with low deployment costs. Quality of Service (QoS), is a major significant parameter and objective to be considered along with AP placement as well the overall deployment cost. This study proposes and investigates a multi-level optimization algorithm called Wireless Optimization Algorithm for Indoor Placement (WOAIP) based on Binary Particle Swarm Optimization (BPSO). WOAIP aims to obtain the optimum AP multi-floor placement with effective coverage that makes it more capable of supporting QoS and cost-effectiveness. Five pairs (coverage, AP deployment) of weights, signal thresholds and received s

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Sensors
A Novel Application of Deep Learning (Convolutional Neural Network) for Traumatic Spinal Cord Injury Classification Using Automatically Learned Features of EMG Signal
...Show More Authors

In this study, a traumatic spinal cord injury (TSCI) classification system is proposed using a convolutional neural network (CNN) technique with automatically learned features from electromyography (EMG) signals for a non-human primate (NHP) model. A comparison between the proposed classification system and a classical classification method (k-nearest neighbors, kNN) is also presented. Developing such an NHP model with a suitable assessment tool (i.e., classifier) is a crucial step in detecting the effect of TSCI using EMG, which is expected to be essential in the evaluation of the efficacy of new TSCI treatments. Intramuscular EMG data were collected from an agonist/antagonist tail muscle pair for the pre- and post-spinal cord lesi

... Show More
View Publication
Scopus (10)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (22)
Crossref (12)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Critical Pragmatic Approach to Aggression in Moriatry's Big Little Lies
...Show More Authors

Abstract

People are supposed to use language harmoniously and compatibly. However, aggression may characterize much of human communication. Aggression has long been recognized as a negative anti-social issue that prevails in most personal interactions. If it abounds in familial communications, it is more dangerous due to its harmful effects on individuals, and consequently on societies. Aggression refers to all the instances in which we try to get our way without any consideration for others. Moriarty’s novel (2014), Big Little Lies, is argued to represent the patterns of aggressive communications. This study aims to find out the motivations behind aggressive language in familial communication in this

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 25 2019
Journal Name
Al-academy
Educational -Learning Design in the Achievement and Motivation of Students in the High School towards Art Education: كنعان غضبان حبيب
...Show More Authors

  The present study aimed at ((building an educational -learning design based on the theory of Merrill in (CDT) and measuring the effectiveness of this design in the motivation and achievement of the high school fifth grade students to art education in the subject of the history of modern art)). The research community is made of fifth grade preparatory students in the secondary school of Umm Ayman in the Directorate of Education of Baghdad / Ar-Rusafa in a simple random way. The study sample (58 students) was chosen from section (e) to study according to Merrill theory (CDT) and section (d) to study according to the traditional way.
The pilot design of the control and experimental equivalent groups that have partial control in t

... Show More
View Publication Preview PDF
Crossref