In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The Kurds' positions were characterized by insistence on their rights during the monarchy and choosing various solutions to obtain independence. After the revolution of July 14, 1958, the Kurds welcomed it, and the leaders of the Kurdistan Democratic Party sent a telegram to the Free Officers Organization congratulating them on the new era in order to build sound and correct relations between the two parties. However, the military conflict was renewed between the Iraqi government and the Kurds and continued even after the coup of February 8, 1963, and all the subsequent negotiating and peaceful attempts to resolve the Kurdish problem until 1966. It was a state of double contradiction for both parties that thwarted the peaceful attempts. The
... Show MoreTopic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic
... Show MoreBackground: The treatment of moderate-to-severe psoriasis has advanced significantly with the use of biologic treatments. Objective: To compare the effectiveness, safety, and impact on quality of life of biologic therapies versus conventional systemic therapies for moderate-to-severe psoriasis, using evidence from 2015 to 2025, focusing on the implications for understudied regions such as Iraq and the Middle East. Methods: Data was collected using "Embase," "MEDLINE," "PubMed," and "Cochrane Central Register." The study includes 45 randomized controlled trials. Additionally, 25 key real-world evidence studies were included for qualitative synthesis to provide context on long-term drug survival, quality of life, and regional applicab
... Show MoreObjectives:
To evaluate mothers’ attitudes toward readiness for discharge care at home for a premature baby in Intensive Care Unit at teaching hospitals in Medical City Complex and to find out the relationship between mothers’ attitudes and their socio-demographic characteristics.
Methodology: A quasi-experimental study design was carried out through the period of 6th January 2020 to 2021 to 11th March 2021, to evaluate mother’s attitude toward discharge care plan for premature babies. The study carried out in Welfare Teaching Hospital, Nursing Home Hospital and Baghdad Teaching Hospital at Medical City Complex in Baghdad City on 30 mother of premature babies in neonatal intensive care units using the nonprobability sampling
In this paper, we focus on designing feed forward neural network (FFNN) for solving Mixed Volterra – Fredholm Integral Equations (MVFIEs) of second kind in 2–dimensions. in our method, we present a multi – layers model consisting of a hidden layer which has five hidden units (neurons) and one linear output unit. Transfer function (Log – sigmoid) and training algorithm (Levenberg – Marquardt) are used as a sigmoid activation of each unit. A comparison between the results of numerical experiment and the analytic solution of some examples has been carried out in order to justify the efficiency and the accuracy of our method.
... Show More
The modern business environment has witnesses tremendous developments as a result of the globalization of markets and economic openness and technological as well as the acquisition of the issue of corporate governance of great importance regarding it as one of the global innovations trends of control provisions on the management of companies as result of these developments ,increasing on competition between economic unit ,thus a decrease in market share because they do not take into account the response to the requirements of customers ,which kept her to search a modern management accounting methods to help them keep up with the changes and the availability of information for the various adminis
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8