Information centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation mechanism in a CCN-SDN environment (PV-CSDN) is proposed to detect and mitigate CPA. PV-CSDN is based on observing the behavior of legitimate users to learn the normal traffic pattern and record the required threshold values. Two key parameters are used to achieve the threshold values: the popularity of the contents and the average rate of repeated requests for each interface in the router. The current traffic pattern will be compared with the predefined thresholds and if any variation in the traffic is occurred the attack is detected. The algorithm was able to detect the attack, and as a mitigation process, the controller will block the malicious interface to prevent any further degradation in the performance. The experiments show that PV-CSD detects and prevents the attack effectively.
The depth conversion process is a significant task in seismic interpretation to establish the link between the seismic data in the time domain and the drilled wells in the depth domain. To promote the exploration and development of the Subba oilfield, more accurate depth conversion is required. In this paper, three approaches of depth conversions: Models 1, 2, and 3 are applied from the simplest to the most complex on Nahr Umr Reservoir in Suba oilfield. This is to obtain the best approach, giving less mistakes with the actual depth at well locations and good inter/extrapolation between or away from well controls. The results of these approaches, together with the uncertainty analysis provide a reliable velocity model
... Show MoreIn this work, an explicit formula for a class of Bi-Bazilevic univalent functions involving differential operator is given, as well as the determination of upper bounds for the general Taylor-Maclaurin coefficient of a functions belong to this class, are established Faber polynomials are used as a coordinated system to study the geometry of the manifold of coefficients for these functions. Also determining bounds for the first two coefficients of such functions.
In certain cases, our initial estimates improve some of the coefficient bounds and link them to earlier thoughtful results that are published earlier.
Objectives: The present study aimed to assess the compulsion among health care providers during the pandemic of COVID-19.
Methodology: a descriptive design was used in the present study. This study was conducted from October 10th, 2020 through May 20th, 2021. The study was conducted on a probability (convenient) sample of 248 physicians and nurses who work at Baghdad Teaching hospital in Baghdad city. The instrument was used in this study is the COVID Stress Scale-Arabic version (CSS).
Results: The result of this study showed that 42 % of HCPs had moderate symptoms and 36% of them had mild compulsive symptoms, and
... Show MoreAn experimental study was conducted with low cost natural waste adsorbent materials, barley husks and eggshells, for the removal of Levofloxacine (LEVX) antibacterial from synthetic waste water. Batch sorption tests were conducted to study their isothermal adsorption capacity and compared with conventional activated carbon which were, activated carbon > barley husks > eggshells with removal efficiencies 74, 71 and 42 % with adsorbents doses of 5, 5 and 50 g/L of activated carbon, barley husks, and eggshells respectively. The equilibrium sorption isotherms had been analyzed by Langmuir, Freundlich, and Sips models, and their parameters were evaluated. The experimental data were correlated well with the Langmuir model which gives the
... Show MoreInterested current Research measuring damage currency Swap by converting The ministry of higher Education and scientific Research money The Iraqi dinar To U.S dollar by Trade Bank Of Iraq , And that The damage Generated resulting from Deferent Between the Exchange Rate adopted From Central Bank of Iraq and Market Exchange Rate adopted by The Trade Bank Of Iraq , and Which led to the greet damage ( losses ) in Bearing by the ministry, which led to the reduction of the financial allocations for licensed curriculum outside of Iraq , and this in turn leads to reduction in the number of students Sender ( scholarships ) outside Iraq.
Where the estimated loss (damage) that suffer by the Ministry of H
... Show MoreBackground: Extracorporeal Shock wave lithotripsy (ESWL) is widely used in treating patients with ureteralstones because it is effective, safe, and noninvasive. Based on factors such as size and the location of stones,there is a significant variation in the overall stone-free rate (SFR).Aim of the study: To evaluate the effect of ureteral wall thickness (UWT), stone attenuation, the time fromfirst attack of pain till first session of ESWL and stone/ rib density on the outcome of SWL in the treatmentof upper ureteral stones (UUS).Patient and methods: A prospective study when 127 patients with radio-opaque UUS ranging from 7 to 20mm and treated by ESWL were included in this study. The effect of (stone/ 12th rib) density by KUB, ureter
... Show MoreIn this paper, a numerical approximation for a time fractional one-dimensional bioheat equation (transfer paradigm) of temperature distribution in tissues is introduced. It deals with the Caputo fractional derivative with order for time fractional derivative and new mixed nonpolynomial spline for second order of space derivative. We also analyzed the convergence and stability by employing Von Neumann method for the present scheme.