In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreThe goal of this work is demonstrating, through the gradient observation of a of type linear ( -systems), the possibility for reducing the effect of any disturbances (pollution, radiation, infection, etc.) asymptotically, by a suitable choice of related actuators of these systems. Thus, a class of ( -system) was developed based on finite time ( -system). Furthermore, definitions and some properties of this concept -system and asymptotically gradient controllable system ( -controllable) were stated and studied. More precisely, asymptotically gradient efficient actuators ensuring the weak asymptotically gradient compensation system ( -system) of known or unknown disturbances are examined. Consequently, under convenient hypo
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThe current research aimed to identify the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis. It also aims to identify the recovery and resuming plan to the business environment. The research followed the descriptive survey to find out the views of 34 internal auditors at various functional levels in the Kingdom of Saudi Arabia. Spreadsheets (Excel) were used to analyze the data collected by a questionnaire which composed of 43 statements, covering the tasks that the internal auditors can perform to face the COVID-19 crisis. Results revealed that the tasks performed by the internal auditors when developing a business continuity plan to face the COVID-19 crisis is to en
... Show Moreأدى التغير السريع في البيئة الخارجية للمنظمة إلى ظهور حالة من التنافس الشديد مما زاد تخوف الشركات من فقدان الحصة السوقية والخسارة . مما حدا بالمنظمات إلى الاهتمام بوجود مدير يحمل صفات وخصائص قيادية لما فيه من ميزات في تنظيم الإنتاج ومقابلة الطلب وتقليل التكاليف وتطوير الأداء للحصول على ميزة تنافسية تحافظ او تزيد من حصتها السوقية وإرباحها .
تسعى الدراسة الى تحديد عدد من الاهداف كان اهمها معرفة الع
... Show MoreFoundations supporting reciprocating engines, radar towers, turbines, large electric motors, and generators, etc. are subject to vibrations caused by unbalanced machine forces as well as the static weight of the machine. If these vibrations are excessive, they may damage the machine or cause it not to function properly. In the case of block foundation, if changes in size and mass of the foundation do not lead to a satisfactory design, a pile foundation may be used. In this study, the dynamic response of piles and pile Groups in dry sand is investigated experimentally. The analysis involves the displacement response under harmonic excitation. In addition, a numerical modeling by using finite element method with a three-dimensional formula
... Show MoreThis paper considers a new Double Integral transform called Double Sumudu-Elzaki transform DSET. The combining of the DSET with a semi-analytical method, namely the variational iteration method DSETVIM, to arrive numerical solution of nonlinear PDEs of Fractional Order derivatives. The proposed dual method property decreases the number of calculations required, so combining these two methods leads to calculating the solution's speed. The suggested technique is tested on four problems. The results demonstrated that solving these types of equations using the DSETVIM was more advantageous and efficient
DBN Dr. Liqaa Habeb, International Journal of Multidisciplinary Reseach, 2015