In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreThe study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership pos
... Show MoreThis study was conducted at the Poultry Research Station, Animal Resources Research Department at the Agricultural Research Department / Ministry of Agriculture - Baghdad Abu Ghraib. To find the effect of adding different proportions of Bay Laurus powder on productive performance and some physiological characteristics of birds during the production stage as Eight Hundreds Female birds of quail were used at the age of 45 days, randomly deployed to 4 treatments with two replicates (100 birds / replicate ) each, and the bay laurel powder was added in the proportions 0.0, 0.5, 1.0, and 1.5% to the diets and for a period of 60 days divided into 4 periods of 15-day .The results indicated si
The research aims to achieve a set of the most important objectives of the review of the role of creative administrative leadership in achieving aspects of economic reform in various government institutions and indicate the role of supervisory awareness of administrative leadership in the revitalization of the role of the internal control system to achieve the best use of available resources. This paper deals with three problems is the loss of financial resources of the state as a result of the growing phenomenon of administrative and financial corruption in the majority of government institutions, and the weakness of the role of the internal control system in the province on the resources available and to achieve the best use of these reso
... Show MoreThe aim of the research is to explain the nature of the relationship between the dimensions of the strategic recovery of the service represented by (compensation, speed of response, apology, initiative (defining the problem) and the strategic goals of the company represented in (profitability, growth, community service, employee satisfaction) in the National Insurance Company, it has been approved The questionnaire as a tool to collect data and information from the sample of (58) who are in (department manager, M. department director, division official, unit official) and the statistical program (spss) was used in calculating (arithmetic mean, standard deviation, coefficient of variation, coefficient of Correlation, t-test, varia
... Show MoreAn expression for the transition charge density is investigated where the deformation in nuclear collective modes is taken into consideration besides the shell model transition density. The inelastic longitudinal form factors C2 calculated using this transition charge density with excitation of the levels for Cr54,52,50 nuclei. In this work, the core polarization transition density is evaluated by adopting the shape of Tassie model together with the derived form of the ground state two-body charge density distributions (2BCDD's). It is noticed that the core polarization effects which represent the collective modes are essential in obtaining a remarkable agreement between the calculated inelastic longitudinal F(q)'s and those of experimen
... Show More