In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove
... Show MoreFuture wireless networks will require advance physical-layer techniques to meet the requirements of Internet of Everything (IoE) applications and massive communication systems. To this end, a massive MIMO (m-MIMO) system is to date considered one of the key technologies for future wireless networks. This is due to the capability of m-MIMO to bring a significant improvement in the spectral efficiency and energy efficiency. However, designing an efficient downlink (DL) training sequence for fast channel state information (CSI) estimation, i.e., with limited coherence time, in a frequency division duplex (FDD) m-MIMO system when users exhibit different correlation patterns, i.e., span distinct channel covariance matrices, is to date ve
... Show More—This paper studies the control motion of a single link flexible joint robot by using a hierarchical non-singular terminal sliding mode controller (HNTSMC). In comparison to the conventional sliding mode controller (CSMC), the proposed algorithm (NTSMC) not only can conserve characteristics of the convention CSMC, such as easy implementation, guaranteed stability and good robustness against system uncertainties and external disturbances, but also can ensure a faster convergence rate of the systems states to zero in a finite time and singularity free. The flexible joint robot (FJR) is a two degree of freedom (2DOF) nonlinear and underactuated system. The system here is modeled as a fourth order system by using Lagrangian method. Based on t
... Show MoreThis work studies the impact of input machining parameters of Electrical Discharge Machining (EDM) on the machining process performance. Tool steel O1 was selected as the workpiece material, copper as the electrode material, and kerosene as the dielectric medium. Experimental runs have been carried out with a Design of Experiment (DOE) technique. Twenty tests are accomplished with the current range of (18 to 24 Ampere), a pulse duration range of (150 to 200 µs), and a pulse-off time range of (25 to 75 µs). Based upon the experimental study's output results, the EDM parameter's effect (voltage of power supply, discharge current, pulse duration, and pulse pause interval) on the responses of the process represented by sur
... Show MoreThe research aims to identify the tax policy strategy adopted in Iraq after the change of the tax system in 2003 and beyond, and then make a comparison of the two strategies on corporate data whether they are charged with progressive tax rates and after the change of the system as the tax rates became fixed, and then indicate the changes In the tax proceeds, and knowing the dimensions of the approved tax policy, is it a tax reform strategy or a strategy to attract investments.
The research started from the problem of exposure of the Iraqi tax system to several changes in the tax strategy from 2003 until now, as this led to a reflection on the technical organization of taxes, in terms of the tax exemption.And these many amendments
... Show Morewell log analysis is used to determine the rock properties like porosity, water saturation, and shale volume. Archie parameters in Archie equation, which sometimes considered constants greatly affect the determination of water saturation, also these parameters may be used to indicate whether the rocks are fractured or not so they should be determined. This research involves well logging analysis for Zubair formation in Luhais field which involves the determination of Archie parameters instead of using them as constant.
The log interpretation proved that the formation is hydrocarbon reservoir, as it could be concluded from Rwa (high values) and water saturation values (low values), the lithology of Zubair from cro
... Show Moreهدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي
... Show MoreThe location of the study area is surging hills in Bongomene area, Gorontalo, Indonesia. In this study, a geological survey and sampling were taken, and then an analysis of the content of benthic foraminifera was performed in each sample. The study aims to discover the species of benthic foraminifera fossils and to determine the paleobathymetry to the studied regions. The results of the analysis contained seven fossils species, namely Ammomassilina alveoliniformis, Stelligerum astrononion, Haynesia germanica, Nonion fabum, Praeglobobulimina ovata, Rhabdammina discreata and Saccorhiza ramosa. Based on the content of benthic foraminifera fossils, paleobathymetry is determined as Middle Shelf to Outer
... Show MoreIn this study, six square reinforced concrete flat plates with dimensions of (1500×1500×100) mm were tested under a concentrated load applied on a column located at the center of the slabs. One of these slabs was the control specimen, whereas, in the others, steel angles (steel collars) were used, fixed at the connection region between the slab and the column to investigate the effect of the presence of these collars on punching shear strength. Five thicknesses were used (4, 5, 6, 8, 10mm) with constant legs of angles (75×75) mm of the steel collars to investigate the effects on the punching shear resistance with respect to the control slab. The results of the experimental study show that the punching shear resistance increased b
... Show MoreFor a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E0 the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E1 and E2 happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened.