In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The presence of deposition in the river decreases the river flow capability's efficiency due to the absence of maintenance along the river. In This research, a new formula to evaluate the sediment capacity in the upstream part of Al-Gharraf River will be developed. The current study reach lies in Wasit province with a distance equal to 58 km. The selected reach of the river was divided into thirteen stations. At each station, the suspended load and the bedload were collected from the river during a sampling period extended from February 2019 till July 2019. The samples were examined in the laboratory with a different set of sample tests. The formula was developed using data of ten stations, and the other three s
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis study utilized low-cost agricultural waste (molasses production waste powder) to extract copper ions from aqueous solutions. The present investigation explored a range of factors that influence the adsorption process, including temperature, pH, ionic strength, contact time, quantity of adsorbent, and particle size. Spectrophotometric analysis was used to determine the solution's absorbance both before and after the adsorption procedure. The Langmuir and Freundlich adsorption models were used to match the equilibrium data. The Freundlich model was determined to be the best isotherm model using the linear regression coefficient R2=0.9868. Thermodynamic parameters, including enthalpy, entropy, and Gibbs free energy, were calculate
... Show MoreBeta-lactam medications are among the commonly used antibiotics. These drugs kill germs by disrupting cell wall formation. This drug treats bacterial infections in numerous body sections. A new, quick, high-performance liquid chromatography approach has been developed and verified by the FDA and EMA for the simultaneous estimation of drugs in their medicinal and pure forms. This study deals with the determination of beta-lactam drugs (Amoxicillin, Ampicillin, Cephalexin, Cefotaxime, Cefoxitin, Cefamandole, Cephalothin, Piperacillin, Penicillin, Oxacillin, Cloxacillin, Nafcillin, Carbenicillin, Mezlocillin, Dicloxacillin) by a Reversed-Phase High-Performance Liquid Chromatography (RP-HPLC) technique based on an UV detector using a
... Show MoreThe economy of a city has an important role not only in its establishment but also in its development. This is quite clear in the city of Baghdad throughout its history since its building in 762 A.D. In addition, most of its problems that the city is suffering from are basically related to not giving enough importance to the economic factors in the master planning of Baghdad since 1950’s. This may explain the failiars of master plans in dealing with the actual population growth and the city's inability to absorb such increases and interrelated and diverse activities which are negatively reflected on the economic variables particularly the effect on the land values, and the strong competitions amongst the land uses without previ
... Show MoreWere analyzed curved optical fates Almarchih absolute colony of the binary type, the Great Palmstqrh using mathematical relationships derived for that and that gave us the results closer to the results of the observed spectral Great Colonial
United nation determined many basic climatic effects which affect the crust of Earth.
And the most important one is the climatic change and its effect on environmental, economic,
social, and political effects. So, the amount of rain which is considered as one of climatic
changes in Iraq should be studied.So, this research explains the factors which affect rain, its
overall average, the variation in the amounts of rain, the amount of yearly rain and variation
in both yearly and monthly rains by using standard variation and yearly fluctuation.As a
result, it is concluded that the number of rainy days doesn't mean an increase in rains amount.
And there's variation in rains amount in all study areas which is contrastive
In this research we present An idea of setting up same split plots experiments in many locations and many periods by Latin Square Design. This cases represents a modest contribution in area of design and analysis of experiments. we had written (theoretically) the general plans, the mathematical models for these experiments, and finding the derivations of EMS for each component (source) of sources of variation of the analysis of variance tables which uses for the statistical analysis for these expirements