In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
This research work aims to the determination of molybdenum (VI) ion via the formation of peroxy molybdenum compounds which has red-brown colour with absorbance wave length at 455nm for the system of ammonia solution-hydrogen peroxide-molybdenum (VI) using a completely newly developed microphotometer based on the ON-Line measurement. Variation of responses expressed in millivolt. A correlation coefficient of 0.9925 for the range of 2.5-150 ?g.ml-1 with percentage linearity of 98.50%. A detection limit of 0.25 ?g.ml-1 was obtained. All physical and chemical variable were optimized interferences of cation and anion were studied classical method of measurement were done and compared well with newly on-line measurements. Application for the use
... Show MoreThe preparation, spectroscopic characterisation of complexes derived from the mixed ligands with CdII, ZnII and CoII metal ions with Schiff base, Dithiocarbamates (DTCs) and 8-Hydroxyquinoline are reported. The compounds that prepared have been defined via; chloride content, F.T-IR, UV-Vis 1H-NMR spectroscopy and C.H.N.S, as well as conductance and magnetic susceptibility.All data which collected from such methods specified complexes with 6 coordinates in solution and solid states. The biologicalactivity that is related to all the prepared compounds which were screened for their antimicrobial activitiesagainst (G+ and (G-)). The data that collected from biological activity indicate that complexes will have extra activity against such tested
... Show MoreReducing global warming potential (GWP) of refrigerants is needed to the decrease of ozone-depleting of refrigeration systems leakages. Refrigerant R1234yf is now used to substitute R134a inside mobile air conditioning systems. Thermodynamic properties of R1234yf are similar to R134a. Also, it has a very low GWP of 4, compared to 1430 for R134a, making it a proper choice for future automobile refrigerants. The purpose of this research is to represent the main operating and performance differences between R1234yf and R134a. Experimental analysis was carried out on the automotive air conditioning system (AACS) with 3 kW nominal capacity, to test and compare the performance of R134a with R1234yf. Experiments were accomplish
... Show MoreThe COVID-19 pandemic has necessitated new methods for controlling the spread of the virus, and machine learning (ML) holds promise in this regard. Our study aims to explore the latest ML algorithms utilized for COVID-19 prediction, with a focus on their potential to optimize decision-making and resource allocation during peak periods of the pandemic. Our review stands out from others as it concentrates primarily on ML methods for disease prediction.To conduct this scoping review, we performed a Google Scholar literature search using "COVID-19," "prediction," and "machine learning" as keywords, with a custom range from 2020 to 2022. Of the 99 articles that were screened for eligibility, we selected 20 for the final review.Our system
... Show MoreAny software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects
... Show MoreCantilever beams are used in many crucial applications in machinery and construction. For example, the airplane wing, the microscopic probe for atomic force measurement, the tower crane overhang and twin overhang folding bridge are typical examples of cantilever beams. The current research aims to develop an analytical solution for the free vibration problem of cantilever beams. The dynamic response of AISI 304 beam represented by the natural frequencies was determined under different working surrounding temperatures ((-100 ℃ to 400 ℃)). A Matlab code was developed to achieve the analytical solution results, considering the effect of some beam geometrical dimensions. The developed analytical solution has been verified successful
... Show MoreIn this paper, the concept of fully stable Banach Algebra modules relative to an ideal has been introduced. Let A be an algebra, X is called fully stable Banach A-module relative to ideal K of A, if for every submodule Y of X and for each multiplier ?:Y?X such that ?(Y)?Y+KX. Their properties and other characterizations for this concept have been studied.
Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p
The study scrutinises intermingled relations between children literature and some ecological issues. Such interwoven relationships would be highly recommended to encourage children to explore and identify themselves with nature from early ages to avoid facing an extreme experience later on. The research limits its scope to two novels Suzanne Collins’ (1962) The Hunger Games trilogy (2003-2007) and William Golding’s (1911-1993) Lord of the Flies (1954), and both novels have no direct connections with Ecology and the Eco-consciousness, yet it offers an insightful description about Man’s experience with Nature. Moreover, it raises serious moral questions, raises awareness, heals wounds and suggests solutions for the problems th
... Show MoreThis study shows impoliteness as a form of face-threatening that can be intentionally caused by verbal threats in a particular setting. It investigates: what strategies and mitigators do Iraqi-Kurdish English as a foreign language (EFL) learners use in situations of threat responses? The present investigation paper aims to examine impoliteness strategies and mitigators by these learners when they respond to threatening situations in their context. Thus, it fills a gap in pragmatics literature by investigating the reactions to threats in an Iraqi-Kurdish EFL context. To this end, 50 participants have participated in this study. An open-ended questionnaire in the form of a Discourse Completion Task (DCT) is used to elicit responses fr
... Show More