Preferred Language
Articles
/
pRZ3l4cBVTCNdQwCnVfS
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 08 2023
Journal Name
Eneurologicalsci
Double encephalocele with an excellent outcome postoperatively: A case report from Iraq
...Show More Authors

HTH Ali Tarik Abdulwahid , Ahmed Dheyaa Al-Obaidi , Mustafa Najah Al-Obaidi, eNeurologicalSci, 2023

View Publication
Scopus (3)
Scopus
Publication Date
Thu Nov 17 2016
Journal Name
International Journal Of Computer Applications
Colour Recognizing Robot Arm Equipped with a CMOS Camera and an FPGA
...Show More Authors

In this paper a system is designed on an FPGA using a Nios II soft-core processor, to detect the colour of a specific surface and moving a robot arm accordingly. The surface being detected is bounded by a starting mark and an ending mark, to define the region of interest. The surface is also divided into sections as rows and columns and each section can have any colour. Such a system has so many uses like for example warehouses or even in stores where their storing areas can be divided to sections and each section is coloured and a robot arm collects objects from these sections according to the section’s colour also the robot arm can organize objects in sections according to the section’s colour.

Crossref (1)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Designing a Quality System using the Goals Programming Method -An Applied Research
...Show More Authors

Due to the continuous development in society and the multiplicity of customers' desires and their keeping pace with this development and their search for the quality and durability of the commodity that provides them with the best performance and that meets their needs and desires, all this has led to the consideration of quality as one of the competitive advantages that many industrial companies compete for and which are of interest to customers and are looking for. The research problem showed that the Diyala State Company for Electrical Industries relies on some simple methods and personal experience to monitor the quality of products and does not adopt scientific methods and modern programs. The aim of this research is to desi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Wed May 03 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Enhancing smart home energy efficiency through accurate load prediction using deep convolutional neural networks
...Show More Authors

The method of predicting the electricity load of a home using deep learning techniques is called intelligent home load prediction based on deep convolutional neural networks. This method uses convolutional neural networks to analyze data from various sources such as weather, time of day, and other factors to accurately predict the electricity load of a home. The purpose of this method is to help optimize energy usage and reduce energy costs. The article proposes a deep learning-based approach for nonpermanent residential electrical ener-gy load forecasting that employs temporal convolutional networks (TCN) to model historic load collection with timeseries traits and to study notably dynamic patterns of variants amongst attribute par

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
A Unit Plan Based Upon The MI Theory: A theoretical study with an application Inside The Classroom
...Show More Authors

This research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Pediatric Dental Journal
Retrospective analysis of 1286 oral and maxillofacial biopsied lesions of Iraqi children over a 30 years period
...Show More Authors

Objectives To determine the prevalence of oral lesions by age and gender among the pediatric population in Iraq. Materials and methods A review of the archives of the oral pathology department of Baghdad University from, 1970 Materials and Methods: A review of the archives of the oral pathology department of Baghdad University from 1970 to 2013 for all biopsies from children aged 0–15 years old. Results A total of 1286 child specimens represented 11.98% of all biopsied lesions. The pyogenic granuloma was the most frequent lesion in children, and the periapical cyst was the most frequent lesion from an odontogenic origin. The incidence of malignant lesions was higher in the 0–3 age group than other groups. Conclusions The majority of les

... Show More
View Publication
Scopus (15)
Crossref (11)
Scopus Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Consideration of Worker Safety in the Design Process: A Statistical-Based Approach Using Analysis of Variance (ANOVA)
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 09 2023
Journal Name
Plos One
A cross-sectional analysis of the predictors of COVID-19 vaccine uptake and vaccine hesitancy in Iraq
...Show More Authors
Background

Vaccine hesitancy poses a significant risk to global recovery from COVID-19. To date however, there is little research exploring the psychological factors associated with vaccine acceptability and hesitancy in Iraq.

Aim

To explore attitudes towards COVID-19 vaccination in Iraq. To establish the predictors of vaccine uptake and vaccine hesitancy in an Iraqi population.

Methods

Using a cross-sectional design, 7,778 participants completed an online questionnaire exploring their vaccination status, likelihood of infection, perc

... Show More
View Publication
Scopus (15)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Mon May 01 2023
Journal Name
Complementary Therapies In Medicine
Effects of almond intake on oxidative stress parameters: A systematic review and meta-analysis of clinical trials
...Show More Authors

View Publication
Scopus (9)
Crossref (10)
Scopus Clarivate Crossref