Preferred Language
Articles
/
pRZ3l4cBVTCNdQwCnVfS
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
WLAN Integrated with GPRS Network Securely
...Show More Authors

In this paper a WLAN network that accesses the Internet through a GPRS network was implemented and tested. The proposed network is managed by the Linux based server. Because of the limited facilities of GPRS such as dynamic IP addressing besides to its limited bandwidth a number of techniques are implemented to overcome these limitations.

      Dynamic Host Configuration Protocol (DHCP) server was added to provide a single central control for all TCP/IP resources. Squid Proxy  was added to provide caching of the redundant accessed Web content to reduce the Internet bandwidth usage and speeding up the client’s download time. Network Address Translation (NAT) service was configured to share one IP ad

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Human Face Recognition Using Wavelet Network
...Show More Authors

 

            This paper presents a study of wavelet self-organizing maps (WSOM) for face recognition. The WSOM is a feed forward network that estimates optimized wavelet based for the discrete wavelet transform (DWT) on the basis of the distribution of the input data, where wavelet basis transforms are used as activation function.

 

 

View Publication Preview PDF
Publication Date
Sat Jun 24 2023
Journal Name
Arab World English Journal
The Construction of Racism in Cartoon Films: A Critical Discourse Analysis
...Show More Authors

Animation is an industry that is expanding more quickly than ever. Every child’s favorite activity is watching cartoons. Therefore, it is essential to be cautious of the kinds of cartoon films children and teenagers tend. Because children and teenagers are the target audience for these films. This study aims at exposing a hidden enactment, namely racism, in a well-known cartoon film, Lion King, which has been selected accurately by the researchers because it shapes a set of ideas about black people and constructs prejudiced beliefs in their minds. This study is to answer the inquiry ‘Is the ideology of racism imposed in Lion King? And how?’ The significance of the present paper lies in highlighting the educational function of

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Sun Jun 18 2023
Journal Name
International Journal Of Development In Social Sciences And Humanities
A CRITICAL DISCOURSE ANALYSIS OF SELECTED POLITICAL SPEECH ON ONLINE EDUCATION
...Show More Authors

PDBN Rashid, International Journal of Development in Social Sciences and Humanities, 2023

View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Journal Of The College Of Education For Women
A Stylistic Analysis of Two Selected Poems: تحليل اسلوبي لقصيدتين مختارتين
...Show More Authors

 

This paper presents a stylistic analysis of two poems of well-known poets of the English literature, namely; E.E. Cummings and the Irish noble laureate Seamus Heaney.  The researcher's attempt here is to approach Cummings’s poem “maggie and milly and molly and may” and Heaney’s “A Kite for Aibhín from the stylistics’ point of view.  The paper also analyzes the poems using the tools of linguistics with a view to make their meaning explicit.

          It is worth noting that stylistics as a scientific discipline is really beneficial to those who are teaching and studyi

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2024
Journal Name
Al-adab Journal
A Rhetorical Stylistic Analysis of English Political Headlines in Selected Newspapers
...Show More Authors

This study explores the language used in reporting political headlines conducting a rhetorical stylistic analysis. It is based on showing the effect of the rhetorical stylistic relations in news reporting. The aim is to investigate the structure adopted in reporting political news. It argues that the rhetorical stylistic devices are necessary and applicable to non-literary texts, i.e. political headlines to evaluate language use in the representation of non-literary texts. The analysis was carried out on data selected from the British broadsheet The Guardian and the American New York Times newspaper headlines. The data were examined and subjected to a contrastive analysis incorporating rhetorical and stylistic tools to discern h

... Show More
View Publication
Crossref
Publication Date
Thu May 01 2003
Journal Name
Renewable Energy
FT-IR and XPS analysis of a-Si1-xGex:H thin films
...Show More Authors

View Publication
Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jun 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Micro-Bubble Flotation for Removing Cadmium Ions from Aqueous Solution: Artificial Neural Network Modeling and Kinetic of Flotation
...Show More Authors

In this work, microbubble dispersed air flotation technique was applied for cadmium ions removal from wastewater aqueous solution. Experiments parameters such as pH (3, 4, 5, and 6), initial Cd(II) ions concentration (40, 80, and 120 mg/l)  contact time( 2, 5, 10 , 15, and 20min), and surfactant (10, 20and 40mg/l) were studied in order to optimize the best conditions .The experimental results indicate that microbubbles were quite effective in removing cadmium ions and the anionic surfactant SDS was found to be more efficient than cationic CTAB in flotation process. 92.3% maximum removal efficiency achieved through 15min at pH 5, SDS surfactant concentration 20mg/l, flow rate250 cm3/min and at 40mg/l Cd(II) ions initial co

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Ieee Transactions On Cognitive Communications And Networking
Multi-Channel Distributed DSA Networks: Connectivity and Rendezvous Tradeoffs
...Show More Authors

In this paper, we investigate and characterize the effects of multi-channel and rendezvous protocols on the connectivity of dynamic spectrum access networks using percolation theory. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from a phenomenon which we define as channel abundance. To cope with the existence of multi-channel, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocols, it becomes difficult for two nodes to agree on a common channel, thereby, potentially remaining invisible to each other. We model this in

... Show More
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref