In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
In this paper, a Modified Weighted Low Energy Adaptive Clustering Hierarchy (MW-LEACH) protocol is implemented to improve the Quality of Service (QoS) in Wireless Sensor Network (WSN) with mobile sink node. The Quality of Service is measured in terms of Throughput Ratio (TR), Packet Loss Ratio (PLR) and Energy Consumption (EC). The protocol is implemented based on Python simulation. Simulation Results showed that the proposed protocol provides better Quality of Service in comparison with Weighted Low Energy Cluster Hierarchy (W-LEACH) protocol by 63%.
This study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreBackground: Proper cleaning and shaping of the whole root canal space have been recognized as a real challenge, particularly in oval-shaped canals.This in vitro study was conducted to evaluate and compare the efficiency of different instrumentation systems in removing of dentin debris at three thirds of oval-shaped root canals and to compare the percentage of remaining dentin debris among the three thirds for each instrumentation system. Materials and methods: Fifty freshly extracted human mandibular molars with single straight oval-shaped distal root canals were randomly divided into five groups of ten teeth each. Group One: instrumentation with ProTaper Universal hand instruments, Group Two: instrumentation with ProTaper Universal rotary
... Show MoreThe purpose of this research is defining the main factors influencing on decision of management system on sensitive data in cloud. The framework is proposed to enhance management information systems decision on sensitive information in cloud environment. The structured interview with several security experts working on cloud computing security to investigate the main objective of framework and suitability of instrument, a pilot study conducts to test the instrument. The validity and reliability test results expose that study can be expanded and lead to final framework validation. This framework using multilevel related to Authorization, Authentication, Classification and identity anonymity, and save and verify, to enhance management
... Show MoreThis research deals with the most famous existing definitions of public relations, in an attempt to achieve a definition that will be added to the other existing and widespread definitions, especially that big developments have taken place in the concept of public relations and their idiomatic use.
In addition, many definitions of public relations have been restricted to some limited descriptions, therefore many of the descriptions given to the public relations are basically definitions as well as characteristics of the public relations.
This research aims at setting and formulating the definitions of public relations, it also deals with its credibility in achieving its significance in order to reach a new definition that
... Show MoreCharacterization is commonly known in stylistics to be the cognitive process in the readers' minds when comprehending a fictional character in a literary work .In one approach, it is assumed that characters are the outcome of the interaction between the words in the text on the one hand and the contents of our heads on the other. This paper is an attempt to understand how characterization is achieved by applying Culpeper’s (2001) model which seems to be to present a method of analysis that is more objective and more systematic in analyzing characters. Two characters are selected for discussion; Ralph and Jack from Golding’s (1954) Lord of the Flies. The novel talks about the corruption of human beings and the capacity of evil th
... Show MoreThe aim: to evaluate combined microscopy techniques for determining the morphological and optical properties of methadone hydrochloride (MDN) crystals. Materials and methods: MDN crystal formation was optimized using a closed container method and crystals were characterized using polarized light microscope (PLM), scanning electron microscopy (SEM) and confocal microscopy (CM). SEM and CM were used to determine MDN crystal thickness and study its relationship with crystal retardation colours using the Michel-Levy Birefringence approach. Results: Dimensions (mean±SD) of diamond shaped MDN crystals were confirmed using SEM and CM. Crystals were 46.4±15.2 Vs 32.0±8.3 µm long, 28.03±8.2 Vs 20.85±5.5 µm wide, and 6.62±
... Show MoreThe research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit
... Show More