In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The use of antibiotics without prescription (self-medication) is growing globally and is associated with increased bacterial resistance, ineffective treatment and adverse reactions. This study aimed at assessing the practice of antibiotic self-medication in the Iraqi population. A cross-sectional study design was adopted in this work. The sample was comprised of 303 staff members from the non-medical colleges in Iraq. An online questionnaire was distributed between the 29th of June to the 14th of September 2021 to collect data including socio-demographic characteristics and questions about antibiotic self-medication. Most of the participants had a university degree and a moderate monthly income. The majority (88%) h
... Show MoreAbstract: Due to the geopolitical importance of Syria in the Middle East region, which constitutes the captain's egg in regional and international balances, which made it a battleground, specifically after 2011 through the outbreak of the Syrian revolution and exacerbation was significantly to form an international crisis, and the emergence of intense regional competition. A broad regional polarization, the main objective of which is the uniqueness of regional leadership among the regional leaders of the region's leadership (Iran, Israel, Turkey, Saudi Arabia), It has taken a wide turn which resulted in a significant development in political events, which led to the failure of regional influential poles in the region to contain the crisi
... Show MoreMedia plays an important role in shaping the mental image of their audiences for individuals, groups and organizations, States and peoples. It is the window through which overlooks the masses on events and issues, and in the light of their exposure to these means are their opinions and impressions.
Despite the importance of direct experiences in shaping opinions, drawing pictures and impressions, it is inevitable to rely on these means as individuals can not engage in direct experiences with thousands of events, issues and topics that concern their community and other societies.
There is no doubt that media is of great importance at the present time, because of its significant impact in the management of the course of pol
... Show MoreInfrastructure, especially wastewater projects, plays an important role in the life of residential communities. Due to the increasing population growth, there is also a significant increase in residential and commercial facilities. This research aims to develop two models for predicting the cost and time of wastewater projects according to independent variables affecting them. These variables have been determined through a questionnaire distributed to 20 projects under construction in Al-Kut City/ Wasit Governorate/Iraq. The researcher used artificial neural network technology to develop the models. The results showed that the coefficient of correlation R between actual and predicted values were 99.4% and 99 %, MAPE was
... Show MoreThe study aims at finding out:
1. The students' attitude towards the mixed learning at the university.
2. The statistically significant differences in attitude towards the mixed learning at the university according to the specialization variable.
3. The statistically significant differences in attitude towards the mixed learning at the university according to the gender variable.
The researcher has constructed a scale for measuring the students' attitude towards the mixed learning at the university.
After assuring its validity and reliability, the scale has been given to a sample of (100) students. The sample is selected randomly from (4) colleges of the university of Baghdad, (2) for scientific specialization and (2)for h
Women issues occupy an important place in international and development projects and programs. This is one of the goals of 21 Century announced during universal summit conference in 2000. The goals are : teaching children, reducing the average of the dead, in addition to the main goal which is reducing the poor level in 2015.
The increasing number of countries that adopt democratic policies, economic freedom and openness lead to heighten and develop the role of women in different ways. As a result, many feminism journals have appeared. Since journals help people to make decisions about public issues as well as acquiring new knowledge, it stimulates women to make decisions.
Feminism journalism takes a new trend. It has become specia
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MorePleomorphic adenoma (PA) is the most frequent benign epithelial neoplasm of salivary glands, displaying a remarkable degree of morphological variety. The aim of the study is to illustrate the clinicopathological characteristics of PA with particular emphases on epithelial cell morphology and mesenchymal elements. Materials and Methods: A total of 132 PA collected between 2002 and 2017 were recruited from Al Shahid Ghazi Al Hariri Hospital and the Department of Oral Pathology, College of Dentistry, Baghdad University, Baghdad, Iraq, and analyzed for their demographic and histopathological features. All data were analyzed using descriptive statistics. A slightly higher incidence of PA was detected in females (52.3%) compared to male subject
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreThis work is concerned with building a three-dimensional (3D) ab-initio models that is capable of predicting the thermal distribution of laser direct joining processes between Polymethylmethacrylate (PMMA) and stainless steel 304(st.st.304). ANSYS® simulation based on finite element analysis (FEA) was implemented for materials joining in two modes; laser transmission joining (LTJ) and conduction joining (CJ). ANSYS® simulator was used to explore the thermal environment of the joints during joining (heating time) and after joining (cooling time). For both modes, the investigation is carried out when the laser spot is at the middle of the joint width, at 15 mm from the commencement point (joint edge) at traveling time of 3.75 s. Process par
... Show More