Preferred Language
Articles
/
pRZ3l4cBVTCNdQwCnVfS
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 22 2025
Journal Name
Webology
Is the Stealth Marketing an Element of Promotion Mix? A Review of the Techniques
...Show More Authors

Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the

... Show More
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Pharmaceutical And Biomedical Analysis
An optoelectronic flow-through detectors for active ingredients determination in the pharmaceutical formulations
...Show More Authors

An optoelectronic flow-through detector for active ingredients determination in pharmaceutical formulations is explained. Two consecutive compact photodetector’s devices operating according to light-emitting diodes-solar cells concept where the LEDs acting as a light source and solar cells for measuring the attenuated light of the incident light at 180˚ have been developed. The turbidimetric detector, fabricated of ten light-emitting diodes and five solar cells only, integrated with a glass flow cell has been easily adapted in flow injection analysis manifold system. For active ingredients determination, the developed detector was successfully utilized for the development and validation of an analytical method for warfarin determination

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Fault Location of Doukan-Erbil 132kv Double Transmission Lines Using Artificial Neural Network ANN
...Show More Authors

Transmission lines are generally subjected to faults, so it is advantageous to determine these faults as quickly as possible. This study uses an Artificial Neural Network technique to locate a fault as soon as it happens on the Doukan-Erbil of 132kv double Transmission lines network. CYME 7.1-Programming/Simulink utilized simulation to model the suggested network. A multilayer perceptron feed-forward artificial neural network with a back propagation learning algorithm is used for the intelligence locator's training, testing, assessment, and validation. Voltages and currents were applied as inputs during the neural network's training. The pre-fault and post-fault values determined the scaled values. The neural network's p

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Esic
Comparative Analysis of Economic Policy Stability between Monarchical and Republican Systems: A Theoretical Fundamental Research
...Show More Authors

Comparative Analysis of Economic Policy Stability between Monarchical and Republican Systems: A Theoretical Fundamental Research

Publication Date
Sat Feb 01 2025
Journal Name
مجلة واسط للعلوم الانسانية
A Pragmatic Analysis of Emotional Blackmail in the American Movie No One Would Tell (2018)
...Show More Authors

Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018).  To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Numerical Analysis of Double Diffusive Laminar Natural Convection in a Right Angle Triangular Solar Collector
...Show More Authors

A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 04 2023
Journal Name
Frontiers In Chemestry
Thermal and flow performance analysis of a concentrated linear Fresnel solar collector with transverse ribs
...Show More Authors

This article deals with the impact of including transverse ribs within the absorber tube of the concentrated linear Fresnel collector (CLFRC) system with a secondary compound parabolic collector (CPC) on thermal and flow performance coefficients. The enhancement rates of heat transfer due to varying governing parameters were compared and analyzed parametrically at Reynolds numbers in the range 5,000–13,000, employing water as the heat transfer fluid. Simulations were performed to solve the governing equations using the finite volume method (FVM) under various boundary conditions. For all Reynolds numbers, the average Nusselt number in the circular tube in the CLFRC system with ribs was found to be larger than that of the plain abs

... Show More
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Mar 18 2025
Journal Name
Physica Scripta
Design and Analysis of a highly sensitive open trapezoidal channel PCF-based Plasmonic Refractometric Sensor
...Show More Authors
Abstract<p>This study introduces a highly sensitive trapezium-shaped PCF based on an SPR refractometric sensor with unique design features. The structure of a sensor was designed and analyzed using COMSOL Multiphysics v5.6 based on Finite Element Method (FEM) with a focus on investigating the influence of various geometric parameters on its performance. The two channels were coated with a metallic gold layer to provide chemical stability, and a thin layer of TiO₂ improved the gold's adhesion to the fiber. The findings indicate that the proposed sensor achieves maximum amplitude and wavelength sensitivities of 1,779 RIU⁻¹ and 30,500 nm/RIU, respectively, with corresponding resolutions of 3.2</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref