In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
Communities seek to achieve the economic growth through the optimal use of resources. The human resource is considered the most important of those resources where the insurance institutions take the larger role in the protection of this resource and reducing the impact caused by dangers realization that endures. The general Iraqi insurance company is considered the leading in the field of life insurance since it was founded, and until now.
This research is based on an analyzing the relation between premiums and compensations of life insurance, for individual and the group insurance, and a reality of the
... Show MoreSteel-concrete-steel (SCS) structural element solutions are rising due to their advantages over conventional reinforced concrete in terms of cost and strength. The impact of SCS sections with various core materials on the structural performance of composites has not yet been fully explored experimentally, and in this work, both slag and polypropylene fibers were incorporated in producing eco-friendly steel-concrete-steel composite sections. This study examined the ductility, ultimate strength, failure modes, and energy absorption capacities of steel-concrete-steel filled with eco-friendly concrete, enhanced by polypropylene fiber (PPF) to understand its impact on modern structural projects. Eco-friendly concrete was produced by the partial
... Show MoreThe equation of Kepler is used to solve different problems associated with celestial mechanics and the dynamics of the orbit. It is an exact explanation for the movement of any two bodies in space under the effect of gravity. This equation represents the body in space in terms of polar coordinates; thus, it can also specify the time required for the body to complete its period along the orbit around another body. This paper is a review for previously published papers related to solve Kepler’s equation and eccentric anomaly. It aims to collect and assess changed iterative initial values for eccentric anomaly for forty previous years. Those initial values are tested to select the finest one based on the number of iterations, as well as the
... Show More<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but
... Show MoreThis study examines the impact of different curing methods on the compressive strength of concrete. It investigates techniques such as air curing, periodic water spraying, full water submersion, and polyethylene encasement. Artificial neural network models were employed to evaluate the compressive strength under each curing condition. A model for calculating compressive strength that considers surrounding conditions was created using an artificial neural network. The current study’s figures were generated using this model. The research thoroughly examined the impact of curing environments and concrete mix components on strength properties, taking into account factors such as tempera
Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreThe aim of this research is to identify the availability of visual thinking skills in the chemistry textbook scheduled for the third intermediate grade for the academic year (2020-2021) in the Republic of Iraq. The study sample consisted of all (85) images contained in the chemistry course for the third intermediate grade, which are (85) form using the curriculum. Analytical descriptive A list of visual thinking skills was prepared, and the unit of form was adopted as a unit of analysis and repetition as a unit of counting, and frequencies and percentages were used for statistical treatment, and validity and reliability were calculated. And using the Holste equation. The following results were reached: The skill
... Show More