In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The emergence of SARS-CoV-2, the virus responsible for the COVID-19 pandemic, has resulted in a global health crisis leading to widespread illness, death, and daily life disruptions. Having a vaccine for COVID-19 is crucial to controlling the spread of the virus which will help to end the pandemic and restore normalcy to society. Messenger RNA (mRNA) molecules vaccine has led the way as the swift vaccine candidate for COVID-19, but it faces key probable restrictions including spontaneous deterioration. To address mRNA degradation issues, Stanford University academics and the Eterna community sponsored a Kaggle competition.This study aims to build a deep learning (DL) model which will predict deterioration rates at each base of the mRNA
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreMelanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution,
... Show MoreIn this study, a theoretical scenario has been used to calculate the electronic current in sensitizer N3 molecule contact to TiO2 semiconductor for electrons in functional solar cells. It is known to play an important role on the compute the eficiency of solar cell. Some parameters of electronic current such as the transition energy, driving force energy, barrier height coupling overlapping values are determined. Transition energy is a necessary parameter to calculate the electronic current in solar cell with using wide polarity solvents Acetic acid, 2-Methoxyethanol, 1-Butanol, Methyl alcohol, chloroform, N,N-Dimethylacetamide and Ethyl alcohol via the quantum donor-acceptor system. Here, we show the results of transition energy can be var
... Show MoreSeeds of three American species of cucumber:-Lot number (EM285) signed as number 1,
To CAEEN F1 signed as number 2 ,and Hybird Super Green F1 signed as number 3, were
exposed to two kinds of physical effects .They were given :- 4 frequencies of the electric
current (0,1,2and 2.5) Am for five minutes using electro- magnetic generator .Then the three
species exposed to Ultra-Violet (UV)wave for four periods (0,30,60 and 90)sec. respectively
at 254 nm using Hood light .After exposure time the seeds were planted in sterlized
media(MS) with Benzyladenine (BA)and left in the incubator for2-3 weeks .Then ,plantlets of
the three species were taken to study the root system ,shoot system ,dry and wet weight for
them
A survey conducted at Dalmaj marsh, Al-Diwaniya Province during 2013 revealed that the marsh encounters a considerable part of the Iraqi vertebrate fauna including 147 species belonging to five classes; Pisces, Amphibia, Reptilia, Aves and Mammalia. Some species are of globally conservation importance. The present results are discussed with the pertinent literature.
(3) (PDF) Theoretical calculation of the electronic current at N3 contact with TiO2 solar cell devices. Available from: https://www.researchgate.net/publication/362780274_Theoretical_calculation_of_the_electronic_current_at_N3_contact_with_TiO2_solar_cell_devices [accessed May 01 2023].
This research is devoted to investigating the thermal buckling analysis behaviour of laminated composite plates subjected to uniform and non-uniform temperature fields by applying an analytical model based on a refined plate theory (RPT) with five unknown independent variables. The theory accounts for the parabolic distribution of the transverse shear strains through the plate thickness and satisfies the zero-traction boundary condition on the surface without using shear correction factors; hence a shear correction factor is not required. The governing differential equations and associated boundary conditions are derived by using the virtual work principle and solved via Navier-type analytical procedure to obtain critica
... Show MoreThis research aims to determine the Attitudes Towards Fashion accessories of Saudi youth, and the descriptive analytical method was used in this research. The research sample was 500 youth in Riyadh that age between 20 to less than 40. The most important results show that young people prefer shoes by 53.2%, that 45.2% of young people prefer acquiring modern designs in fashion accessories, and the research emphasized the importance of studying the impact of rapid economic, social and cultural developments on young people’s attitudes towards fashion and its accessories, directing the attention of Saudi fashion designers towards complements Fashion to offer designs that match their trends
Abstract
Biosimilars are non-innovative copy versions of biologic medicines which are proven to be clinically equivalent to, as effective and as safe as their reference biologics. Biosimilars creates opportunities for cost savings for payers, governments, and patients compared with the reference products. Pharmacist plays an essential role in developing biosimilar medicines from manufacturing to post-marketing pharmacovigilance monitoring. The aim of the current study was to explore the level of knowledge, behaviors and practices of a sample of Iraqi pharmacists towards biosimilar medicines. The current study was a cross sectional, carried out during May 2020. A total of 2
... Show More