Preferred Language
Articles
/
pRZ3l4cBVTCNdQwCnVfS
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Aug 01 2014
Journal Name
Int. J. Mod. Eng. Res
Exact solutions for MHD flow of a viscoelastic fluid with the fractional Burgers’ model in an annular pipe
...Show More Authors

This paper presents an analytical study for the magnetohydrodynamic (MHD) flow of a generalized Burgers’ fluid in an annular pipe. Closed from solutions for velocity is obtained by using finite Hankel transform and discrete Laplace transform of the sequential fractional derivatives. Finally, the figures are plotted to show the effects of different parameters on the velocity profile.

View Publication
Publication Date
Wed Dec 25 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Peaceful settlement as a means of preventing tax: An applied research in the General Commission for Taxation evasion
...Show More Authors

The reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer

The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .

The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.

The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 28 2024
Journal Name
Arab World English Journal
Cowboy as a Symbol of Individualism: A Pragmatic Analysis of Red Dead Redemption 2
...Show More Authors

As cultures are mainly divided into collectivistic and individualistic, members tend to emphasize, through communication, either their position as part of their group or their independence from the group. This emphasis is manifested in using the pragmatic concepts of positive politeness and negative politeness. The present study looks into the reflection of these two cultures in Rockstar’s renowned video game, Red Dead Redemption 2 (2018). It aims at identifying the two cultures as present in the game and showing their significance to its narrative. It fills the gap in the studies of language used within video games as well as its cultural reflections. The study addresses the following question: What are the positive and negative

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Thu Jun 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Forecasting Credit Losses in A Sample of Iraqi Banks - A Comparative Analysis
...Show More Authors

  The general trend in Iraqi banks is focused towards the application of international financial reporting standards, especially the international financial reporting standard IFRS 9 “Financial Instruments”, in addition to the directives issued on the Central Bank of Iraq’s instructions for the year 2018 regarding the development of expected credit losses models, and not to adhere to a specific method for calculating these losses and authorizing the banks’ departments to adopt the method of calculating losses that suits the nature of the bank’s activity and to be consistent in its use from time to time. The research problem revolves around the different methodologies for calculatin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Engineering
Artificial Neural Network (ANN) for Prediction of Viscosity Reduction of Heavy Crude Oil using Different Organic Solvents
...Show More Authors

The increase globally fossil fuel consumption as it represents the main source of energy around the world, and the sources of heavy oil more than light, different techniques were used to reduce the viscosity and increase mobility of heavy crude oil. this study focusing on the experimental tests  and modeling with Back Feed Forward Artificial Neural Network (BFF-ANN) of the dilution technique to reduce a  heavy oil viscosity that was collected from the south- Iraq oil fields using organic solvents, organic diluents with different weight percentage  (5, 10 and  20 wt.% )  of  (n-heptane, toluene, and a mixture of  different ratio

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Pertanika Journal Of Science & Technology
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
...Show More Authors

Credit risk assessment has become an important topic in financial risk administration. Fuzzy clustering analysis has been applied in credit scoring. Gustafson-Kessel (GK) algorithm has been utilised to cluster creditworthy customers as against non-creditworthy ones. A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. Utilising similar degree between points to get similarity density, and then by means of maximum density points selecting; the modified Kohonen Network method generate clustering initial centres to get more reasonable clustering res

... Show More
Scopus (9)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Clinical And Experimental Dentistry
Bond strength of a new Kevlar fiber-reinforced composite post with semi-interpenetrating polymer network (IPN) matrix
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Oct 02 2020
Journal Name
International Journal Of Pharmaceutical Research
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Crossref
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Fri May 01 2020
Journal Name
International Journal Of Advanced Science And Technology
Improved Merging Multi Convolutional Neural Networks Framework of Image Indexing and Retrieval
...Show More Authors

Background/Objectives: The purpose of current research aims to a modified image representation framework for Content-Based Image Retrieval (CBIR) through gray scale input image, Zernike Moments (ZMs) properties, Local Binary Pattern (LBP), Y Color Space, Slantlet Transform (SLT), and Discrete Wavelet Transform (DWT). Methods/Statistical analysis: This study surveyed and analysed three standard datasets WANG V1.0, WANG V2.0, and Caltech 101. The features an image of objects in this sets that belong to 101 classes-with approximately 40-800 images for every category. The suggested infrastructure within the study seeks to present a description and operationalization of the CBIR system through automated attribute extraction system premised on CN

... Show More