In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show MoreIn this paper, a least squares group finite element method for solving coupled Burgers' problem in 2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved. The theoretical results show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic
... Show MoreSeepage occurs under or inside structures or in the place, where they come into contact with the sides under the influence of pressure caused by the difference in water level in the structure U / S and D / S. This paper is designed to model seepage analysis for Kongele (an earth dam) due to its importance in providing water for agricultural projects and supporting Tourism sector. For this purpose, analysis was carried out to study seepage through the dam under various conditions. Using the finite element method by computer program (Geo-Studio) the dam was analysed in its actual design using the SEEP / W 2018 program. Several analyses were performed to study the seepage across Kongele
Shell-and-double concentric tube heat exchanger is one of the new designs that enhance the heat transfer process. Entransy dissipation is a recent development that incorporates thermodynamics in the design and optimization of heat exchangers. In this paper the concept of entransy dissipation is related to the shell-and-double concentric tube heat exchanger for the first time, where the experiments were conducted using hot oil with temperature of 80, 100 and 120°C, flow rate of cold water was 0.667, 1, and 1.334 kg/m3 respectively and the temperature of inlet cold water was 20°C. The entransy dissipation rate due to heat transfer and to fluid friction or pressure drop was studied.
Addressed the problem of the research is marked: (Performing processors for the time between Impressionism and superrealism) the concept of time and how to submit artwork. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then determine the research objectives of (detection processors performing to the concept of time in works of art in each of Impressionism and superrealism. And a comparison between them to reveal similarities and differences), followed by the establishment of boundaries Find three (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theore
... Show MoreBackground: Oral cancer is a highly lethal and disfiguring disease. Squamous cell carcinoma of the oral cavity constitutes about 90% of all oral malignancies. The aims of the study was to achieve an epidemiological description of the oral squamous cell carcinoma in Iraq in general and in Iraqi governorates except Kurdistan region retrospectively during period 2001-2013 Materials and Methods: Data were collected from department of oral and maxillofacial pathology, college of dentistry, university of Baghdad, Nuclear medicine and radiotherapy hospital, Iraqi cancer registry center, Main hospitals in Baghdad and Iraqi governorates, Private labs. for histopathological examinations. The descriptive and inferential statistical methods were used
... Show MoreBackground: Behçet’s disease (BD) is a disorder of systemic inflammatory condition. Its important features are represented by recurrent oral, genital ulcerations and eye lesions. Aims. The purpose of the current study was to evaluate and compare cytological changes using morphometric analysis of the exfoliated buccal mucosal cells in Behçet’s disease patients and healthy controls, and to evaluate the clinical characteristics of Behçet’s disease. Methods. Twenty five Behçet’s disease patients have been compared to 25 healthy volunteers as a control group. Papanicolaou stain was used for staining the smears taken from buccal epithelial cells to be analyzed cytomorphometrically. The image analysis software has been used to
... Show MoreUnder-reamed piles are piles with enlarged bases, which may be single bulb or multi bulbs. Such piles are suitable for resisting considerable soil movement of filed up ground, soft clay, and loose sand and have the advantages of increasing the soil strength and decreasing the displacement. In the present study, the finite element method was used to analyse the performance of a single pile with under-reamed bulbs of different shapes, that is, single cone, double cone, and half and full sphere, embedded in homogeneous, poorly graded sandy soil. The model of under-reamed pile was made of reinforced concrete and the bulb located at the middle of the embedded length of the pile. The dynami