In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
The Dirichlet process is an important fundamental object in nonparametric Bayesian modelling, applied to a wide range of problems in machine learning, statistics, and bioinformatics, among other fields. This flexible stochastic process models rich data structures with unknown or evolving number of clusters. It is a valuable tool for encoding the true complexity of real-world data in computer models. Our results show that the Dirichlet process improves, both in distribution density and in signal-to-noise ratio, with larger sample size; achieves slow decay rate to its base distribution; has improved convergence and stability; and thrives with a Gaussian base distribution, which is much better than the Gamma distribution. The performance depen
... Show MoreLanguage plays a major role in all aspects of life. Communication is regarded as the most important of these aspects, as language is used on a daily basis by humanity either in written or spoken forms. Language is also regarded as the main factor of exchanging peoples’ cultures and traditions and in handing down these attributes from generation to generation. Thus, language is a fundamental element in identifying peoples’ ideologies and traditions in the past and the present. Despite these facts, the feminist linguists have objections to some of the language structures, demonstrating that language is gender biased to men. That is, language promotes patriarchal values. This pushed towards developing extensive studies to substantiate s
... Show More
The article critically analyzes traditional translation models. The most influential models of translation in the second half of the 20th century have been mentioned, among which the theory of formal and dynamic equivalence, the theory of regular correspondences, informative, situational-denotative, functional-pragmatic theory of communication levels have been considered. The selected models have been analyzed from the point of view of the universality of their use for different types and types of translation, as well as the ability to comprehend the deep links established between the original and the translation.
Аннотация
This paper features the modeling and design of a pole placement and output Feedback control technique for the Active Vibration Control (AVC) of a smart flexible cantilever beam for a Single Input Single Output (SISO) case. Measurements and actuation actions done by using patches of piezoelectric layer, it is bonded to the master structure as sensor/actuator at a certain position of the cantilever beam.
The smart structure is modeled based on the concept of piezoelectric theory, Bernoulli -Euler beam theory, using Finite Element Method (FEM) and the state space techniques. The number of modes is reduced using the controllability and observability grammians retaining the first three
dominant vibratory modes, and for the reduced syste
Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show More