In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
Background: The study was designed to evaluate the effect of local application of exogenous VEGF/collagen I separately and as a combination in socket healing. Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1st molar of both sides (right side was considered as experimental site, while left be the control one, treated with 1µL of normal saline). The rats were scarified at 3, 7, 14, 28 days post extraction. Socket healing was histologically examined with immunohistochemistochemical localization of ALP&FGF2. Materials and Method: Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1stmolar of both sides (right side was considered as experimental site, while left be the
... Show MoreBackground: The appointment system is a common practice in primary health care clinics in developed countries. The patients and health care providers in the primary health care setting perceived the appointment system as an indicator of good quality service.
Objective: The aim of this study was to survey patients’ and health care providers’ attitudes towards the introduction of an appointment system and their satisfaction with the existing ‘walk-in’ system in the primary health care setting.
Subjects and Methods: A questionnaire survey was conducted included a convenient sample of 234 patients as well as 76 health care providers from two primary health care center
... Show MoreBACKGROUND: The degree of the development of coronary collaterals is long considered an alternate – that is, a collateral – source of blood supply to an area of the myocardium threatened with vascular ischemia or insufficiency. Hence, the coronary collaterals are beneficial but can also promote harmful (adverse) effects. For instance, the coronary steal effect during the myocardial hyperemia phase and that of restenosis following coronary angioplasty. OBJECTIVES: Our study explores the contribution of coronary collaterals – if any exist – while considering other potential predictors, including demographics and medical history, toward the left ventricular (LV) dysfunction measured through the LV ejection fraction (LVEF). METH
... Show MoreBackground: White spot lesions are esthetic problems caused by subsurface enamel demineralization that seen as white opacity. Aim of the study: This study aimed to evaluate and to compare the color change after the treatment of the white spot lesions with resin nϔtrton and micro abrasion. Materials and Methods: rtϔ white spot lesions were generated on 48 premolar teeth by the use of a demineralization solution. The teeth were randomly divided using the Diagnodent into three study groups (16 teeth for each group) depending on the depth of the induced lesions: outer enamel, inner enamel and outer dentine. Then each group was fatherly subdivided into two groups (8 teeth for each group) the ϔrst group was treated wit
... Show MoreAbstract
Purpose of this study is to investigate the relationship between Advertising Appeals, Attitudes toward Advertising, and Consumer Buying Behavior for Smart Phone The study was carried out on the students of Middle East University (MEU) In Amman- Jordan. A measurement scales with acceptable reliability and validity is developed to capture the dimensions of study variables. Four hypotheses were tested using Statistical package (SPSS-17). A two-step detailed statistical analysis of data was involved. First, descriptive statistics was performed to understand the underlying components of study variables; second, regression analysis and Path analysis using AMOS 7 were performed t
... Show MoreObjective: To determine the effectiveness of an Intervention Oriented program on the prognosis of Osteopenia among Women at Private clinics in Baghdad City. Methodology: A longitudinal design. A purposive ''non probability'' sample of (25) Women who have bone mineral density (BMD) T- test between (-1 to -2.5). The data are collected through the utilization of a constructed questionnaire and by means of interview with each client who is involved in the study. Each interview takes approximately (20) minutes. Results: The study showed that there is a good improvement in bone density accord after applicatio
Abstract:
Objectives: The present study aims to evaluate effectiveness of educational program the nurses' knowledge towards early prediction of acquired weakness in the intensive care unit.
Methodology: A pre-experimental study design (comparison of two groups), which was achieved through the pre and post-test method for the study sample through the application of an educational program in the intensive care unit of Al-Zahra Teaching Hospital in Kut city, Wasit Governorate. The study was conducted for the period from 28th April 2022 to 15th August 2022 by selecting a purposive (non-probability) sample for this study. The study sample size was (52) nu
... Show MoreBotnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
The international financial accounting and reporting standards IFRS/IAS represent the set of rules and foundations that the economic entity must follow in the measurement, presentation, and disclosure of the elements of the financial statements, the implementation of adopting the international financial reporting standards contributes to improving the qualitative characteristics of accounting information, so the current research aims to explain the role of adopting the International Accounting Standard (IAS) in improving the qualitative characteristics as well as analyzing the impact of the adoption of IAS.1 in improving the qualitative characteristics of accounting information within the financi
... Show More