أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأساليب المستخدمة في هذا السياق. تقدم هذه الورقة كيفية محاكاة إحصاءات المرور وتوليدها والحصول عليها من بيئة SDN. وبالإضافة إلى ذلك، تعالج المقارنة بين الأساليب المستخدمة في جمع بيانات شبكة المعرفة برمجياً لاستكشاف قدرة كل طريقة، وبالتالي تحديد البيئة المناسبة لكل طريقة. تمت محاكاة اختبار SDN باستخدام برنامج Mininet مع طوبولوجيا الأشجار ومفاتيح OpenFlow. تم توصيل وحدة تحكم RYU بإرسال التحكم. تُستخدم الأدوات الشهيرة iperf3 و ping و python scripts لجمع مجموعات بيانات الشبكة من عدة أجهزة في الشبكة. تم استخدام Wireshark وتطبيقات RYU وأمر ovs-ofctl لمراقبة مجموعة البيانات المجمعة. تظهر النتائج نجاحًا في إنشاء عدة أنواع من مقاييس الشبكة لاستخدامها في المستقبل لتدريب الآلة أو خوارزميات التعلم العميق. وخلصت إلى أنه عند توليد البيانات لغرض التحكم في الازدحام، فإن iperf3 هو أفضل أداة، في حين أن ping مفيد عند توليد البيانات لغرض الكشف عن هجمات DDoS. تعد تطبيقات RYU أكثر ملاءمة للاستفسار عن جميع تفاصيل طوبولوجيا الشبكة نظرًا لقدرتها على عرض الطوبولوجيا وخصائص التبديل وإحصائيات التبديل. كما تم استكشاف العديد من العقبات والأخطاء وإدراجها ليتم منعها عندما يحاول الباحثون إنشاء مجموعات البيانات هذه في جهودهم العلمية التالية.
The scholars differed very much in determining the grammatical doctrine of Ibn Qaysan. It was said that he confused between the two sects and took the two groups(1) and that he took from Abu Abbas the fox and Abu al-Abbas almabrd(2).He was descended from the two sheikhs almbrad and fox(3), This research to find out his grammatical opinions in the tools and grammatical words that appeared in the Book of Resonance of Multiplication to the many reported by Ibn Hayyan in it, he has seen the books of Ibn Kisan did not reach us.
The collection of these opinions and analysis is important for the scholars. Because the books of Ibn Kaysan specialized in grammar have lost their most important, the books that are similar to the book of Ibn al-Ha
In this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po
... Show MoreAn approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreEducation specialists have differed about determining the best ways to detect the
talented. Since the appearance of the mental and psychological measurement movement, some
scholars adopted intelligence ratios as a criterion to identify the talented and others went to
rely on the degree of academic achievement. Each of these two methods has its own flaws and
mistakes and a large number of talented children were victims of these two methods.
Therefore the need to use other scales for the purpose of detection of talented children
appeared because they provide valuable information which may not be obtained easily
through objective tests and these scales are derived from consecutive studies of gifted andtalented children
The basic objective of the research is to study the quality of the water flow service in the Directorate of Karbala sewage and how to improve it after identifying the deviations of the processes and the final product and then providing the possible solutions in addressing the causes of the deviations and the associated quality gaps. A number of quality tools were used and applied to all data Stations with areas and activities related to the drainage of rainwater, as the research community determines the stations of lifting rainwater in the Directorate of the streams of Karbala holy, and the station was chosen Western station to apply the non-random sampling method intended after meeting a number of. It is one of the largest and m
... Show Moreان وضع معايير دولية محاسبية على شكل نماذج وارشادات عامة تؤدي باصحاب القرارات الاقتصادية استخدام معايير المحاسبة الدولية عند اعداد وتجهيز القوائم والبيانات المالية اصبح مطلب اساسي وضرورة ملحة لمختلف الاطراف في المجتمع الحالي فهذه المعايير قد اثمرت في معالجة الامور المحاسبية على الصعيد المحلي والاقليمي والدولي. وان عدد كبير من الدول اعتمدت هذه المعايير فقد تجاوزت 150 بلدا. مما نتج عنه ازالة الفوارق الكث
... Show MoreDatabase is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show MoreAbstract The purpose of this paper is to preparing small games for fifth graders. And to identify the impact of these small games in developing some concepts of traffic safety for fifth graders. The two researchers used the experimental method to solve the research problem, and the research community was identified with students. The fifth grade of primary school in the province of Baghdad and a sample was chosen from the private Baghdad Primary School, which numbered (60) male and female students. They were distributed equally into two groups by simple random method (experimental and control groups). As for the most important conclusions reached by the two researchers, it is the presence of an effect of small games in developing some conce
... Show More