In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The picture has taken a place that sometimes enables it to take precedence over media analysis، psychology، and political communication.
The image has the ability to influence to obtain persuasion، not only emotionally or
dramatically، but also on the level of commercial and political persuasion. In every
image، the intention of that persuasion is hidden.
It can be identified by a set of underlying dimensions such as vitality، social dominance، and confidence، for which a group of specific suggestions or movements، such
as a smile، the movement of hands، or the nature and way of looking with the eyes، is
established. The visual image often precedes its verbal counterpart in the proce
Herein, an efficient inorganic/organic hybrid photocatalyst composed of zeolitic imidazolate framework (ZIF-67) decorated with Cd0.5Zn0.5S solid solution semiconductor was constructed. The properties of prepared ZIF- [email protected] nanocomposite and its components (ZIF-67 and Cd0.5Zn0.5S) were investigated using XRD, FESEM, EDX, TEM, DRS and BET methods. The photocatalytic activity of fabricated [email protected] nanocomposite were measured toward removal of methyl violet (MV) dye as a simulated organic contaminant. Under visible-light and specific conditions (photocatalyst dose 1 g/l, MV dye 10 mg/l, unmodified solution pH 6.7 and reaction time 60 min.), the acquired [email protected] photocatalyst showed advanced photocatalytic activity
... Show MoreThe present work describes numerical and experimental investigation of the heat transfer characteristics in a plate-fin, having built-in piezoelectric actuator mounted on the base plate (substrate). The geometrical configuration considered in the present work is representative of a single element of the plate-fin and triple fins. Air is taken as the working fluid. A performance data for a single rectangular fin and triple fins are provided for different frequency levels (5, 30 and
50HZ) , different input power (5,10,20,30,40 and 50W) and different inlet velocity (0.5, 1, 2, 3, 4, 5 and 6m/s) for the single rectangular fin and triple fins with and without oscillation. The investigation was also performed with different geometrical fin
This research aims to identify the role that forensic accounting plays on the transparency and quality of the financial statements in trade bank of Iraq and the Gulf Commercial Bank in Babylon. This research came to address the problem that most financial institutions suffer from, which is represented by the lack of transparency and the quality of the financial statements issued in a manner. Annual also the manipulation and fraud in the financial data, which causes a big gap between that institutions and organizational stakeholders. According to the implementation of the research hypothesis and the objectives of the research, a questionnaire was prepared consisting of three axes, the first axis dealing with the demographic distri
... Show MoreThe smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec
... Show MoreCeruloplasmin (Cp) is one of the acute phase protein, in this review ,we studied the level of ceruloplasmin with copper (Cu) and iron in 90 patients with coronary heart diseas ( those patients are divided into three groups, whom are stable angina , unstable angina and myocardial infarction compared with 30 healthy volunteers) and the roles of them as diagnostic and prognostic tools.The diagnosis was attend by a clinical examination carried out by the consult medical staff in Ibn AL-Nafis hospital. The result: ceruloplasmin recorded a significantly(p<0.05)higher level in all patient groups compared with the control, so this result supports the hypothesis that a high serum ceruloplasmin level is a risk factor for coronary heart di
... Show MoreThe densities and visconsities of solutions of poly(vinyl alcohol)(PVA) molccuar weight (14)kg.mol-1in water up to 0.035%mol.kg-1
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of
... Show MoreThree-dimensional cavity was investigated numerical in the current study filled with porous medium from a saturated fluid. The problem configuration consists of two insulated bottom and right wall and left vertical wall maintained at constant temperatures at variable locations, using two discretized heaters. The porous cavity fluid motion was represented by the momentum equation generalized model. The present investigation thermophysical parameters included the local thermal equilibrium condition. The isotherms and streamlines was used to examine energy transport and momentum. The meaning of changing parameters on the established average Nusselt number, temperature and velocity distribution are highlighted and discussed.
Each project management system aims to complete the project within its identified objectives: budget, time, and quality. It is achieving the project within the defined deadline that required careful scheduling, that be attained early. Due to the nature of unique repetitive construction projects, time contingency and project uncertainty are necessary for accurate scheduling. It should be integrated and flexible to accommodate the changes without adversely affecting the construction project’s total completion time. Repetitive planning and scheduling methods are more effective and essential. However, they need continuous development because of the evolution of execution methods, essent