In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreAddressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreThe purpose of this paper is to identifying the relationship between some visual functions and the level of achievement of air rifle shooting among young Iraqi female, and identifying the relationship between some functional variables of the respiratory and nervous systems at the level of achievement of air rifle shooting among young Iraqi female. The researchers used the descriptive approach in the correlative relationships style for its suitability and the research problem. The researchers determined the research community by the intentional method represented by (10) young female shooters who represent the national team with air rifle shooting effectiveness, and who represent (100%) of the research community. One of the most important re
... Show MoreWe found that 4,5- diphenyl- 3(2- propynyl) thio- 1??-triazole [1? forms a complex with Pd (11) ion of ratio 1:1 which absorbs light in CH2CI2 at 400 nm, and 4,5- diphenyl- 3(2- propenyl) thio- 1,2,4- triazole [II] forms complexes with Pd (II) ion of ratio 1:1 which absorbs light at 390 nm, and of ratio 2:1 which absorbs light at 435 nm. On the other hand, we found that the new derivative 4- phenyl- 5( p- amino phenyl) -3- mercapto- 1,2,4- triazole ?111? forms complexes with Cu (II) ion of the ratio 1:1 which absorbs light at 380 nm, with Ni (II) ion of the ratio 3:1 which absorbs light at 358 nm; and with Co (11) ion of the ratio 3.2:1 which absorbs light at 588 nm. The ratio of the complexes were determined by measuring the electronic spe
... Show MoreThis research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show Moreيتنامى يوما بعد يوم استخدام السيارات وتتعاضم اعدادها ، فهذا هو عصر السرعة، وخاصة في مجال النقل والمواصلات، والتي تتحقق باستخدام وسائل النقل المختلفة ومن بينها السيارات، وبالتالي اصبحت هذه الوسيلة ضرورية لتحقيق هذه السرعة ومن ضرورات الحياة في انجاز الاعمال.
وتتبارى مصانع السيارات فيما بينها لانتاج انواع السيارات بمواصفات عالية من المتانة والامان والراحة، وفي ذات الوقت اصبحت هندسة الطرق
... Show MoreAs s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreBackground: Genioglossus advancement is a surgical procedure to advance the tongue in some patients with obstructive sleep apnea syndrome.The important step in this procedure is that of accurately capturing the bone segment attached to the genioglossus muscle to avoid complications such as mandibular fracture, devitalization of the inferior incisor roots, and incomplete incorporation of the genioglossus Materials and Method: Computed tomography scans were taken for 53 Iraqi adult patients (28 male and 25 female) range from (18-35) years with skeletal class I classification and intact anterior mandible dentition included in this study using sagittal and axial sections. The measurements were done for genial tubercle and anterior mandibular re
... Show More