أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأساليب المستخدمة في هذا السياق. تقدم هذه الورقة كيفية محاكاة إحصاءات المرور وتوليدها والحصول عليها من بيئة SDN. وبالإضافة إلى ذلك، تعالج المقارنة بين الأساليب المستخدمة في جمع بيانات شبكة المعرفة برمجياً لاستكشاف قدرة كل طريقة، وبالتالي تحديد البيئة المناسبة لكل طريقة. تمت محاكاة اختبار SDN باستخدام برنامج Mininet مع طوبولوجيا الأشجار ومفاتيح OpenFlow. تم توصيل وحدة تحكم RYU بإرسال التحكم. تُستخدم الأدوات الشهيرة iperf3 و ping و python scripts لجمع مجموعات بيانات الشبكة من عدة أجهزة في الشبكة. تم استخدام Wireshark وتطبيقات RYU وأمر ovs-ofctl لمراقبة مجموعة البيانات المجمعة. تظهر النتائج نجاحًا في إنشاء عدة أنواع من مقاييس الشبكة لاستخدامها في المستقبل لتدريب الآلة أو خوارزميات التعلم العميق. وخلصت إلى أنه عند توليد البيانات لغرض التحكم في الازدحام، فإن iperf3 هو أفضل أداة، في حين أن ping مفيد عند توليد البيانات لغرض الكشف عن هجمات DDoS. تعد تطبيقات RYU أكثر ملاءمة للاستفسار عن جميع تفاصيل طوبولوجيا الشبكة نظرًا لقدرتها على عرض الطوبولوجيا وخصائص التبديل وإحصائيات التبديل. كما تم استكشاف العديد من العقبات والأخطاء وإدراجها ليتم منعها عندما يحاول الباحثون إنشاء مجموعات البيانات هذه في جهودهم العلمية التالية.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn this work a model of a source generating truly random quadrature phase shift keying (QPSK) signal constellation required for quantum key distribution (QKD) system based on BB84 protocol using phase coding is implemented by using the software package OPTISYSTEM9. The randomness of the sequence generated is achieved by building an optical setup based on a weak laser source, beam splitters and single-photon avalanche photodiodes operating in Geiger mode. The random string obtained from the optical setup is used to generate the quadrature phase shift keying signal constellation required for phase coding in quantum key distribution system based on BB84 protocol with a bit rate of 2GHz/s.
Abstract
This research aims to analyze the reality of the production process in an assembly line Cars (RUNNA) in the public company for the automotive industry / Alexandria through the use of some Lean production tools, and data were collected through permanence in the company to identify the problems of the line in order to find appropriate to adopt some Lean production tools solutions, and results showed the presence of Lead time in some stations, which is reflected on the customer's waiting time to get the car, as well as some of the problems existing in the car produced such as high temperature of the car, as the company does not take into account customer preferences,
... Show MoreMany managers in geometrical and technical organizations prefer to deal with quantitative values to choose between the available options and choose the best alternative to avoid randomization and bias in decision making. One of them Baghdad Water Department, which seeks to develop the quality of its product (drinking water) and achieve its objectives under increasing growing population and the demand for water, Some of TQM tools, especially the statistical, have this ability because there is chance to use historical data and experiment of employees in Application . Two statistical tools were applied: the nominal group technique, matrix data analysis technique as well as the brainstorming tool to search for the best o
... Show MoreWe demonstrate a behavior of laser pulse grows through fiber laser inside and output cavity with a soliton fiber laser based on the multi-wall carbon nanotube saturable absorber (SA), we investigate the effects of a saturable absorber parameter on the mode-locking of a realistic Erbium fiber ring laser. Generalized nonlinear Schrodinger equation including the nonlinear effects as gain dispersion, second anomalous group velocity dispersion (GVD), self phase modulation (SPM), and two photon absorption used to describe pulse evolution. An analytical method has been used to understand and to quantify the role of the SA parameter on the propagation dynamics of pulse laser. We compute the chirp, power, width and phase of the soliton for range
... Show MoreSelect the researcher discussed problem of asking the following : Do you use visual intelligence strategy effective in the collection of students in the Department of Art Education in the foreseeable material ? The research aims to " measure the effectiveness of the strategy in the collection of visual intelligence students in the Department of Art Education in the foreseeable material ". To verify the objective of this research was identify hypotheses zero to measure the level of achievement in the foreseeable material second grade students in the Department of Art Education - Faculty of Fine Arts . The population of the research students in the Department of Art Education / Faculty of Fine Arts at the University of Baghdad who are stud
... Show MoreThe data presented in this paper are related to the research article entitled “Novel dichloro(bis{2-[1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal(II) coordination compounds of seven transition metals (Mn, Fe, Co, Ni, Cu, Zn and Cd)” (Conradie et al., 2018) [1]. This paper presents characterization and structural data of the 2-(1-(4-methyl-phenyl)-1H-1,2,3-triazol-1-yl)pyridine ligand (L2 ) (Tawfiq et al., 2014) [2] as well as seven dichloro(bis{2- [1-(4-methylphenyl)-1H-1,2,3-triazol-4-yl-κN3 ]pyridine-κN})metal (II) coordination compounds, [M(L2 )2Cl2], all containing the same ligand but coordinated to different metal ions. The data illustrate the shift in IR, UV/VIS, and NMR (for diamagnetic complexes) peaks wh
... Show More