In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreObjective: Assessment of primary schools science teachers' knowledge towards health promotion in Baghdad City.
Methodology: A descriptive study was conducted at (100) primary school at Al-Rasafa, and Al-Karkh sectors in
Baghdad City, from November 29th 2007 to January 20th 2009. A probability stratified random sample of (100)
teachers who teach science subject was selected, and had at least one year of employment in the teaching field. A
questionnaire format was used which was consisted of (2) parts. The overall number of the items included in the
questionnaire were (205) items. The first part was related to the demographic data of the teachers, the second part
(six sections) was concerned with teachers' knowledge about
Turkish policy towards Africa witnessed important developments over time that began before the Ottoman era and then developed during the Ottoman era when the Ottoman state played an important role in maintaining security by confronting Portuguese interventions in North Africa and sending military aid. Thus, the Ottoman state was able to develop its policy towards Africa for important considerations based mainly on the employment of the religious factor and the spread of Islam for the African acceptance of the Ottomans in the African territories and thus, achieve economic, strategic and political motives. Later, these relations declined in the Republican era due to the weak political and economic potential of Turkey on the one hand and th
... Show MoreABSTRACT : Bacillus cereus and Pseudomonas aeruginosa is the ability to produce a wide antimicrobial active compounds (Bacillin and S-Pyocin) against pathogenic microorganism. In vitro assay with the antagonists of both crude bacteriocin and partial by precipitation 75% ammonium sulfate showed that the effectively inhibited growth of the following (Candida kefyer and Fusarium spp) and Propionibacterium acnes. The results showed the inhibition zone of reached Bacillin (9-13 mm), while Pyocin (13 - 16mm) in solid medium.
Objective: To assess of Science Teachers' Awareness towards Communicable Diseases Control in Baghdad City
Primary Schools
Methodology: A descriptive study was conducted, included (100) primary school, (50) in Al-Rassafa sector, and
(50) in Al-Karkh sector, from March 5th 2012 to March 15th 2013, to assess of science teachers' awareness
towards communicable diseases control. A cluster sample of (100) Science teachers (males and females) were
selected, as one teacher from each school. A questionnaire format was used for data collection. The validity of
questionnaire was estimated through a penal of experts related to the field of study, and its reliability was
estimated through a pilot study conducted in (20) schools (
"Watermarking" is one method in which digital information is buried in a carrier signal;
the hidden information should be related to the carrier signal. There are many different types of
digital watermarking, including traditional watermarking that uses visible media (such as snaps,
images, or video), and a signal may be carrying many watermarks. Any signal that can tolerate
noise, such as audio, video, or picture data, can have a digital watermark implanted in it. A digital
watermark must be able to withstand changes that can be made to the carrier signal in order to
protect copyright information in media files. The goal of digital watermarking is to ensure the
integrity of data, whereas stegano