Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
Background: The autism spectrum disorder (ASD) describes a wide range of symptoms, including difficulty with social interaction and communication skills. Controversial thinking about oral health of children with ASD, in general may have a lower hygiene level than healthy individuals, low caries rate and high body weight in comparison to healthy children. This study was conducted to assess the oral health status in relation to nutritional status among institutionalized autistic children and adolescents. Materials and methods: From 12 institutes in Baghdad, the study group contained 364 child and adolescent with ASD (Male= 294, Female=70), while control group included 441 normal child and adolescent (Male=357, Female=84) from primary and seco
... Show MoreThe study aimed to establish the association of miR-153-3p expression with treatment response to IM in CML patients. Sixty CML patients were included and divided into two groups consistent with their response to treatment whether sensitive or resistant to IM. Ten healthy normal participants were enrolled as control group. RNA was extracted from serum to work out miR-153-3p expression utilizing real-time quantitative reverse transcription polymerase chain reaction. The primers were supplied by Macrogen Inc. Twenty seven patients were sensitive to imatinib and 33 were resistant to imatinib. The ratio of male to female was 1.14:1. The bulk (58%) of patients were within the age range of 41-60 years. Weight and gender did not significantly diffe
... Show MoreAbstract
This research deals with studying and analysis of a poetic group under the
title (Trees behind fence) of the great poet Dr. Ahmed Sulaiman AlAhmed
who is the some of the Shek , Sulaiman Al-Ahmed who is the linguist - poet
and famous jurist member in the Arabic scientific assemble in Damascus and
brother of the great poet Badawi Al-Jabal. This poetic group include two big
poetic legends : the first one is (Trees behind fence , ) which include one
hundred and eighty four line and the second one ( AZ-Mebadia ) which is
consists of one hundred and seventy eight line, both of them from the (Al-
Camil ) meter which is free rhyme which bears a many meaning and pictures
and just the great poet composite the
In this paper, we will study non parametric model when the response variable have missing data (non response) in observations it under missing mechanisms MCAR, then we suggest Kernel-Based Non-Parametric Single-Imputation instead of missing value and compare it with Nearest Neighbor Imputation by using the simulation about some difference models and with difference cases as the sample size, variance and rate of missing data.
The air flow pattern in a co-current pilot plant spray dryer fitted with a rotary disk atomizer was determined experimentally and modelled numerically using Computational Fluid Dynamics (CFD) (ANSYS Fluent ) software. The CFD simulation used a three dimensions system, Reynolds-Average Navier-Stokes equations (RANS), closed via the RNG k −ε turbulence model. Measurements were carried out at a rotation of the atomizer (3000 rpm) and when there is no rotation using a drying air at 25 oC and air velocity at the inlet of 5 m/s without swirl. The air flow pattern was predicted experimentally using cotton tufts and digital anemometer. The CFD simulation predicted a downward central flowing air core surrounded by a slow
... Show MoreNathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea
... Show MoreThis study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of
... Show MoreA mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th
... Show MoreThe present study attempts to examine verbal/nonverbal impoliteness in the classroom interaction and outside it in one of the movies, namely, The Marva Collins. Impoliteness, which is significantly studied within pragmatics, is a negative attitude towards particular behaviors. It always presumes to have emotional concerns for at least one participant who has caused it. This study is an attempt to examine verbal/nonverbal impoliteness in The Marva Collins movie. The study aims to investigate the different types of impoliteness strategies used in the four selected scenes and find out whether the speaker’s status has anything to do with the types of impoliteness. Besides, the functions performed are also examined by following a qual
... Show More