In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The present study investigates the realization and significance of textual themes in the organizational structure of M.A theses and Ph.D. dissertations, namely: the abstracts, introductions and conclusions, since in such parts the students depend on their own expressions, styles and constructions to express different viewpoints, plans, inferences, etc. The study also investigates the similarities and differences between M.A theses and Ph.D. dissertations concerning the use of textual themes;it sets out to conduct a detailed analysis of textual themes used in such texts. In conducting such an analysis, the study adopts Halliday's (1994) approach of textual themes. The results of such an analysis have clearly shown that, in spite of the di
... Show MoreThe study aims at diagnosing the importance of environmental analysis (external, industrial and internal) in the organization's strategy for the development of public organizations. The theoretical problem derived from the existence of a knowledge gap for studies and research that dealt with the variables of the study. Three public organizations were selected as the study society (the Civil Defense Directorate, the Directorate of Nationality, Passports and Residency, the General Traffic Directorate). The sample of the study was a sample of (215) managers (managers, department managers, Analysis of the data and hypothesis testing using the appropriate statistical tools, Pearson, the simple and multiple regression coefficient to te
... Show More|
The speech delivered by political blocs and parties and broadcasted by satellite channels, social and communication media has different ideologies and orientations: moderate speech calling for calm or one raising crises.The latter is considered very challenging due to its local and international reference., this paper aims at uncovering these challenges especially during the political crisis witnessed in Iraq. This paper sheds light on the most important crisis that spread in public opinion, broadcasted by satellite, and raised by politicians who are competing to gain authority leading to a lack of peoples, confidence in them.This matter should not be neglected at all; e |
Some new norms need to be adapted due to COVID-19 pandemic period where people need to wear masks, wash their hands frequently, maintain social distancing, and avoid going out unless necessary. Therefore, educational institutions were closed to minimize the spread of COVID-19. As a result of this, online education was adapted to substitute face-to-face learning. Therefore, this study aimed to assess the Malaysian university students’ adaptation to the new norms, knowledge and practices toward COVID-19, besides, their attitudes toward online learning. A convenient sampling technique was used to recruit 500 Malaysian university students from January to February 2021 through social media. For data collection, all students
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreWith the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show MoreOne of the most important human diseases that need to be considered in terms of development of the medical engineering devices is cardiovascular disease which is a significant cause of death globally recently. Valvular heart disease is normally treated by restoring or altering heart valves with an artificial one. But the new prosthetic valve designs necessitate testing for durability estimate and failure method. It is significant to simulate the circulation system by the building of a pulse duplicator system. This study is stated by clarifying the parameter and implementation steps of the pulse duplicator system in which the different researchers have utilized the system and tried to explain the design steps of using this system wit
... Show MoreHepatitis, an inflammation of the liver, has a number of infectious and non-infectious causes. Two of the viruses that cause hepatitis (hepatitis A and E) can be transmitted through water and food; hygiene is therefore important in their control. First, to assess the importance of HAV and HEV as a possible diagnosis for clinically diagnosed patients with acute viral hepatitis. Second, to assess the prevalence of hepatitis A and E in all provinces of Iraq and study its association with age, gender. This study consisted of two groups: The first group consisted of 2975 patients with a clinical diagnosis of acute viral hepatitis. The second group consisted of a total of 9610 persons, which were recruited by surveying a nationally representative
... Show More