Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm, to detect malicious nodes in an OBS network. The proposed semi-supervised model was trained and validated with small amount data from a selected dataset. Experiments show that the model can classify the nodes into either behaving or not-behaving classes with 90% accuracy when trained with just 20% of data. When the nodes are classified into behaving, not-behaving and potentially not-behaving classes, the model shows 65.15% and 71.84% accuracy if trained with 20% and 30% of data respectively. Comparison with some notable works revealed that the proposed model outperforms them in many respects.
<span lang="EN-US">The use of bio-signals analysis in human-robot interaction is rapidly increasing. There is an urgent demand for it in various applications, including health care, rehabilitation, research, technology, and manufacturing. Despite several state-of-the-art bio-signals analyses in human-robot interaction (HRI) research, it is unclear which one is the best. In this paper, the following topics will be discussed: robotic systems should be given priority in the rehabilitation and aid of amputees and disabled people; second, domains of feature extraction approaches now in use, which are divided into three main sections (time, frequency, and time-frequency). The various domains will be discussed, then a discussion of e
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Nanocrystalline ZnO/Zeolite type A composite was prepared by simple method of operation by . the precipitation of zinc oxide and loading on zeolite 5A in one step. Characterization was made by X-ray diffraction (XRD), X-ray fluorescence(XRF), N2 adsorption- desorption for BET surface area, and Atomic force microscopy (AFM). Results showed that zinc oxide was loaded on zeolite as noticed by the characteristic peaks and was of nano scale having an average diameter of 88.57nm. The percentage loading of ZnO on zeolite A was 28.37% and the surface area was 222m2/g. The activity of the prepared catalyst was examined in the desulfurization of double hydrogenated diesel fuel. The process was investigated in a
... Show MoreKE Sharquie, AF Hameed, AA Noaimi, Indian Journal of Pathology and Microbiology, 2016 - Cited by 12
This research focuses on the contemporary geostrategic transformations that afflicted the countries of the Middle East, with a focus on the countries of the Arab East, after the collapse of the system of international relations, and the emergence of the unipolar system led by the United States of America. After the events of September 11 and the events that followed, especially the occupation of Iraq in 2003, the study area witnessed a group of geopolitical variables and the emergence of dangerous phenomena that threatened the state structure in the countries of the Middle East; the most notably are the phenomenon of terrorism, cross-border armed groups, sectarian polarization, the phenomenon of migration and the internal and the externa
... Show MoreApplications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.
This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit
... Show MoreIn this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show More