Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traffic patterns that can be categorized based on statistical characteristics. These methods help determine the type of traffic and protect user privacy at the same time. To classify encrypted traffic from end to end, this paper proposes using (XGboost) algorithms, finding the highest parameters using Bayesian optimization, and comparing the proposed model with machine learning algorithms (Nearest Neighbor, Logistic Regression, Decision Trees, Naive Bayes, Multilayer Neural Networks) to classify traffic from end to end. Network traffic has two classifications: whether the traffic is encrypted or not, and the target application. The research results showed the possibility of classifying dual and multiple traffic with high accuracy. The proposed model has a higher classification accuracy than the other models, and finding the optimal parameters increases the model accuracy.
Let R be a commutative ring with identity and let M be a unital left R-module.
A.Tercan introduced the following concept.An R-module M is called a CLSmodule
if every y-closed submodule is a direct summand .The main purpose of this
work is to develop the properties of y-closed submodules.
The aim of this paper is to introduce and study the concept of SN-spaces via the notation of simply-open sets as well as to investigate their relationship to other topological spaces and give some of its properties.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
In this paper ,we introduce a concept of Max– module as follows: M is called a Max- module if ann N R is a maximal ideal of R, for each non– zero submodule N of M; In other words, M is a Max– module iff (0) is a *- submodule, where a proper submodule N of M is called a *- submodule if [ ] : N K R is a maximal ideal of R, for each submodule K contains N properly. In this paper, some properties and characterizations of max– modules and *- submodules are given. Also, various basic results a bout Max– modules are considered. Moreover, some relations between max- modules and other types of modules are considered.
... Show MoreGangyong Lee, S.Tariq Rizvi, and Cosmin S.Roman studied Rickart modules.
The main purpose of this paper is to develop the properties of Rickart modules .
We prove that each injective and prime module is a Rickart module. And we give characterizations of some kind of rings in term of Rickart modules.
Let be a right module over a ring with identity. The semisecond submodules are studied in this paper. A nonzero submodule of is called semisecond if for each . More information and characterizations about this concept is provided in our work.
Let R be commutative ring with identity and let M be any unitary left R-module. In this paper we study the properties of ec-closed submodules, ECS- modules and the relation between ECS-modules and other kinds of modules. Also, we study the direct sum of ECS-modules.
We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.
Anew mathematical formula was proposed to describe the behavior of the extinction coefficient as a function of ambient temperature and wavelengths for some of infrared materials. This formula was derived depending on some experimental data of transmittance spectrum versus wavelengths for many ambient temperatures. The extensive study of the spectrum characteristics and depending on Bose-Einstein distribution led to derive an equation connecting the extinction coefficient or the absorption coefficient with the ambient temperature and wavelengths of the incident rays. The basic assumption in deriving process is the decreasing in transmittance value with the increasing temperature which is only due to the changing in extinction coeffi
... Show More