Preferred Language
Articles
/
bsj-4155
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of Physical Education
The Effect of Special Exercises Using with Assisting Aids According to Differentiated Learning (Visual Learners) in Learning Crescent Kick in Fighters of Specialized Taekwondo schools
...Show More Authors

View Publication
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Semi-Small Compressible Modules and Semi-Small Retractable Modules
...Show More Authors

Let  be a commutative ring with 1 and  be left unitary  . In this paper we introduced and studied concept of semi-small compressible module (a     is said to be semi-small compressible module if  can be embedded in every nonzero semi-small submodule of . Equivalently,  is  semi-small compressible module if there exists a monomorphism  , ,     is said to be semi-small retractable module if  , for every non-zero  semi-small sub module in . Equivalently,  is semi-small retractable if there exists a homomorphism  whenever  .

    In this paper we introduce and study the concept of semi-small compressible and semi-small retractable s as a generalization of compressible  and retractable  respectively and give some of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best esti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Generalizations of Fuzzy k-ideals in a KU-algebra with Semigroup
...Show More Authors
Abstract<p>We present the notion of bipolar fuzzy k-ideals with thresholds (<italic>θ, λ</italic>) of a KU-algebra with semigroup and give some basic properties of this ideal. Also, we study some relations about a bipolar fuzzy k-ideal with thresholds (<italic>θ, λ</italic>) and a k-ideal of a KU-semigroup.</p>
View Publication
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Interval Value Fuzzy k-Ideals of a KU-Semigroup
...Show More Authors

The notion of interval value fuzzy k-ideal of KU-semigroup was studied as a generalization of afuzzy k-ideal of KU-semigroup. Some results of this idea under homomorphism are discussed. Also, we presented some properties about the image (pre-image) for interval~ valued fuzzy~k-ideals of a KU-semigroup. Finally, the~ product of~ interval valued fuzzyk-ideals is established.

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Attitude and Altitude Control of Quadrotor Carrying a Suspended Payload using Genetic Algorithm
...Show More Authors

The need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Oct 03 2015
Journal Name
International Journal Of Advanced Scientific And Technical Research
Semi-Extending
...Show More Authors

Throughout this paper R represents commutative ring with identity, and M is a unitary left R-module. The purpose of this paper is to study a new concept, (up to our knowledge), named a semi-extending modules, as generalization of extending modules, where an Rmodule M is called semi-extending if every sub module of M is a semi-essential in a direct summand of M. Various properties of semi-extending module are considered. Moreover, we investigate the relationships between semi-extending modules and other related concepts, such as CLS-modules and FI- extending modules.

Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More