In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
Background: The primary stability of the dental implant is a crucial factor determining the ability to initiate temporary implant-supported prosthesis and for subsequent successful osseointegration, especially in the maxillary non-molar sites. This study assessed the reliability of the insertion torque of dental implants by relating it to the implant stability quotient values measured by the Osstell device. Material and methods: This study included healthy, non-smoker patients with no history of diabetes or other metabolic, or debilitating diseases that may affect bone healing, having non-restorable fractured teeth and retained roots in the maxillary non-molar sites. Primary dental implant stability was evaluated using a torque ratc
... Show MorePoliteness strategies are of significant importance to maintain the face of the addressee. Senders of formal congratulatory letters seek to create a positive image in the minds of their addresses by performing particular illocutionary acts and face-saving acts (FSAs) in the form of written texts. To the best knowledge of the researcher, this topic received little attention from linguistic researchers, especially on the pragma-stylistic level. The importance of this study arises from the fact that congratulatory formal letters are an effective tool in the successful performance of foreign relations and thus deserve investigation. The current study investigates the pragmastylistic aspects of illocutionary acts and FSA Politeness Stra
... Show MoreThe researchers wanted to make a new azo imidazole as a follow-up to their previous work. The ligand 4-[(2-Amino-4-phenylazo)-methyl]-cyclohexane carboxylic acid as a derivative of trans-4-(aminomethyl) cyclohexane carboxylic acid diazonium salt, and synthesis a series of its chelate complexes with metalions, characterized these compounds using a variety technique, including elemental analysis, FTIR, LC-Mass, 1H-NMRand UV-Vis spectral process as well TGA, conductivity and magnetic quantifications. Analytical data showed that the Co (II) complex out to 1:1 metal-ligand ratio with square planner and tetrahedral geometry, respectively while 1:2 metal-ligand ratio in the Cu(II), Cr(III), Mn(II), Zn(II), Ru(III)and Rh(III)complexes
... Show MoreAbstract
Language is one of God’s blessings to human beings through which he
distingushed them from other creatures, then how if this language was arabic.
God honored this language and in which he descended his Gracious Boole
that gave it glory and magnificance, and made it an immortal revelation to the
arab nation in their poetry, oration, history and human tendency to the life of
knowledge, mind leadershipe, innovation and progress.
This study aimed at evaluating the arabic language come program for
the new teachers. The sample was of (25) participants who were shown a
questionaire consisting of (60) items distributed on (9) fields. Then, the data
was processed statisically by using preauency rate, Kai s
Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreArtificial Neural networks (ANN) are powerful and effective tools in time-series applications. The first aim of this paper is to diagnose better and more efficient ANN models (Back Propagation, Radial Basis Function Neural networks (RBF), and Recurrent neural networks) in solving the linear and nonlinear time-series behavior. The second aim is dealing with finding accurate estimators as the convergence sometimes is stack in the local minima. It is one of the problems that can bias the test of the robustness of the ANN in time series forecasting. To determine the best or the optimal ANN models, forecast Skill (SS) employed to measure the efficiency of the performance of ANN models. The mean square error and
... Show MoreObjective: is to determine the level of awareness concerning the reproductive health among adolescent girls in
Baghdad City.
Methodology: A cross sectional study was performed in order to assess the level of awareness regarding reproductive
health among 180 adolescent school girls in the age 12-18 years from five secondary schools in Al-Seder Sector in
Baghdad city, the data was collected by direct interview using constructed questionnaire to obtain socio-demographic
characteristics and level of awareness related to reproductive health. The study started from September 2012 to
January 2013.
Results: the results show that the highest percentage of girls (47.7%) was in age (17-18) year's age, (54.5%) at 4th class
se
This study sheds light on female entrepreneurship in Palestine, and explores the reasons behind its relative weakness as compared with men, and with female entrepreneurship in other countries. This study aims at proposing effective policies and doable measures to enhance female entrepreneurship. Achieving this objective will carry significant impact on employment and economic growth at large, and increase women’s economic participation, scaling up their independence, and demonstrating their skills and abilities, and putting women on an equal footing with men. Furthermore, entrepreneurial activity has increasingly become one of the key drivers of economic development. An increased rate of entrepreneurial activities among women,
... Show MoreSummery of the Study: The Israeli interest in Iraq was not the result of the 2003 US war, which ended with its occupation, but Iraq was still at the top of Israeli concerns, as it was due to its interest and desire to occupy the Zionist movement for a number of reasons, most importantly its religious position in the Jews and control It is a sacred religious duty, so Israel has employed all its organs, institutions, relations and espionage networks in order to penetrate it and perpetuate its existence, and succeeded in achieving its foreign policy objectives at a time when the area was open to it without opposition or competition thanks to its strategic alliance with the states Of the United States of America, which has been able to penet
... Show More