Preferred Language
Articles
/
pRZ3l4cBVTCNdQwCnVfS
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Return Variation on Investment as a Function for the Difference of Market Share: An Applied Research on a Sample of Private Banks listed in Iraq Stock Exchange (ISX)
...Show More Authors

    The research specified with study the relation  between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the  dominated belief  that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve  market coverage for their products and they have dissemination and suitable  promotion activity, the  market share represented the competition  for the banks, and the markets pay attention to the  market share as a strategic objective and to maintain them also increasi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 20 2022
Journal Name
Nano Hybrids And Composites
Fabrication and Characterization of Functionalized Multi-Wall Carbon Nanotubes Flexible Network Modified by a Layer of Polypyrrole Conductive Polymer and Metallic Nanoparticles
...Show More Authors

Short Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato

... Show More
View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
Women's Rape in Iraq between Legislation and Social Norms: A Critical Discourse Analysis
...Show More Authors

Recently, women's rape has been a pervasive problem in the Iraqi society. Thus, it has become necessary to consider the role of language and its influence on the common beliefs and opinions about rape in the Iraqi society. Thus, taking into consideration the critical role of language and its impact on the perception of human reality and the social development based on people's beliefs and principles of life has become highly indispensable. Therefore. The aim of this article is to address this problem critically from legislation and social norms in NGOs' reports (2015; 2019) with reference to some provisions from the Iraqi Panel Code (1969; 2010). Therefore, the researchers examine the discursive strategies and ideological viewpoints in t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The level of Trends banking leaders towards organizational confidence and its and reflection on the dimensions of the strategic position: An applied research in Egypt in Al-mansour Investment and the Business Bay
...Show More Authors

The aim of this research is to show the level of banking leadership trends in the importance of  organizational  confidence and its reflection in the dimensions of the strategic position the research was applied in a bank (Al- Mansour Investment, Business Bay), and the Questionnaire Was adopted as a tool to collect data and information from the number of the sample (15) who are in allocation (Department Manager, Department Manager Department Manager, Division Officer, Unit Officer) and he used the statistical program (spss) to calculate (standard deviation, arithmetic mean, percentages, regression, analysis,F-test coefficient of determination R2, Coefficieent, square Kay and the research reached a number of conclusions, the mos

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
The effect of using XCAST based routing protocol in wireless ad hoc networks
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Apr 24 2019
Journal Name
Annals Of Telecommunications
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Survey Smoothly Fiber-Wireless (FiWi) Accessing Wireless Networks: Convergence and Challenges
...Show More Authors

<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
N – Topological Space and Its Applications in Artificial Neural Networks
...Show More Authors

   In this paper we give definitions, properties and examples of the notion of  type Ntopological space. Throughout this paper  N is a finite positive  number, N 2. The task of this paper is to study and investigate some properties of such spaces with the existence of a relation between this space and artificial Neural Networks (NN'S), that is we applied the definition of this space in computer field and specially in parallel processing

View Publication Preview PDF
Publication Date
Tue Sep 21 2021
Journal Name
Jmerd
stress and strain analysis for the prosthetic hand design actuated by links
...Show More Authors

Prosthetic hands are compensatory devices for the hand amputees as a result of injury, various accidents or birth deformities, types of prosthetic hand vary depending on the mechanism they operate and how they perform. There are common types in use that are characterized by their complex mechanisms, which are difficult for the amputee to use or exclude use because of their high cost, therefore the aim of this research is to design an artificial hand that is suitable in terms of simplicity of use and low cost and similar to a natural hand with regard to dimensions and shape that operated in the mechanism of links. This research involves Stress and strain analysis of the prosthetic hand and its fingers that modelled from (Petg CR)

... Show More
View Publication Preview PDF