In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More<span lang="EN-GB">Transmitting the highest capacity throughput over the longest possible distance without any regeneration stage is an important goal of any long-haul optical network system. Accordingly, Polarization-Multiplexed Quadrature Phase-Shift-Keying (PM-QPSK) was introduced lately to achieve high bit-rate with relatively high spectral efficiency. Unfortunately, the required broad bandwidth of PM-QPSK increases the linear and nonlinear impairments in the physical layer of the optical fiber network. Increased attention has been spent to compensate for these impairments in the last years. In this paper, Single Mode Fiber (SMF), single channel, PM-QPSK transceiver was simulated, with a mix of optical and electrical (Digi
... Show MoreThis paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl
... Show MorePolyaniline Multi wall Carbon nanotube (PANI/MWCNTs) nanocomposite thin films have been prepared by Plasma jet polymerization at low frequency on glass substrate with preliminary deposited aluminum electrodes to form Al/PANI-MWCNT/Al surface-type capacitive humidity sensors, the gap between the electrodes about 50 μm and the MWCNTs weight concentration varied between 0, 1, 2, 3, 4%. The diameter of the MWCNTs was in the range of 8-15 nm and the length 10-55 μm. The capacitance-humidity relationships of the sensors were investigated at humidity levels from 35 to 90% RH. The electrical properties showed that the capacity increased with increasing relative humidity, and that the sensitivity of the sensor increases with the increase of the
... Show MoreIncorporating the LiDAR sensor in the most recent Apple devices represents a substantial development in 3D mapping technology. Meanwhile, Apple's Lidar is still a new sensor. Therefore, this article reviews the potential uses of the Apple Lidar sensor in various fields, including engineering and construction, focusing on indoor and outdoor as-built 3D mapping and cultural heritage conservation. The affordable cost and shorter observation times compared to traditional surveying and other remote sensing techniques make the Apple Lidar an attractive choice among scholars and professionals. This article highlights the need for continued research on the Apple LiDAR sensor technology while discussing its specifications and limitations. A
... Show More