Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
The revolution of multimedia has been a driving force behind fast and secured data transmission techniques. The security of image information from unapproved access is imperative. Encryptions technique is used to transfer data, where each kind of data has its own special elements; thus various methods should to be used to conserve distributing the image. This paper produces image encryption improvements based on proposed an approach to generate efficient intelligent session (mask keys) based on investigates from the combination between robust feature for ECC algebra and construction level in Greedy Randomized Adaptive Search Procedure (GRASP) to produce durable symmetric session mask keys consist of ECC points. Symmetric behavior for ECC
... Show MoreFree Piston Engine Linear Generator (FPELG) is a modern engine and promising power generation engine. It has many advantages compared to conventional engines such as less friction, few numbers of parts, and high thermal efficiency. The cycle-to-cycle variation one of the big challenges of the FPELG because it is influence on the stability and output power of the engine. Therefore, in this study, the effect of ignition time on combustion characteristics is investigated. The single-cylinder FPELG with spark ignition (SI) combustion type by using compressed natural gas (CNG) fuel type was set to run. LabVIEW is used to run the engine and control of input parameters. All experimental data
One of the most interested problems that recently attracts many research investigations in Protein-protein interactions (PPI) networks is complex detection problem. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem wherein, recently, the field of Evolutionary Algorithms (EAs) reveals positive results. The contribution of this work is to introduce a heuristic operator, called protein-complex attraction and repulsion, which is especially tailored for the complex detection problem and to enable the EA to improve its detection ability. The proposed heuristic operator is designed to fine-grain the structure of a complex by dividing it into two more complexes, each being distinguished with a core pr
... Show MoreIn this paper, the bowtie method was utilized by a multidisciplinary team in the Federal Board of Supreme Audit (FBSA)for the purpose of managing corruption risks threatening the Iraqi construction sector. Corruption in Iraq is a widespread phenomenon that threatens to degrade society and halt the wheel of economic development, so it must be reduced through appropriate strategies. A total of eleven corruption risks have been identified by the involved parties in corruption and were analyzed by using probability and impact matrix and their priority has been ranked. Bowtie analysis was conducted on four factors with high score risk in causing corruption in the planning stage. The number and effectiveness of the existing proactive meas
... Show MoreFour hundred and seventy eight gravity base stations in Iraq were used to obtain a new local theoretical gravity equation. The obtained equation was used to construct a Bouguer anomaly map of Iraq depending on the available gravity base stations. This map was compared with the Bouguer map constructed for the same stations using the international formula (1930). Good similarity in shapes and locations of the anomaly were observed, while the gravity anomaly values in the new map were increased by about 30 mGal. The eastern zero gravity contour line of the new obtained gravity map coincides with the western boundary of the tectonic Mesopotamian zone, while the main negative gravity values coincide with the Mesopotami
... Show MoreGroundwater is an important resource that can be used for various purposes. Various factors can change the chemistry of the GW, such as the chemical composition of an aquifer as well as the leaching of human waste into groundwater. The study area is a barren land covered by some sabkhas, in addition to some agricultural fields. The study aims to assess groundwater quality for drinking purposes using the Water Quality Index. The groundwater is chemically heterogeneous and has a wide quality range from very poor to excellent. Evaporation appears to be the controlling factor among the other shallow waters, while relatively deep water is related to rock-soil dominance. Rocks, land use and land cover have helped control the groundwater q
... Show MoreAbstract
At any moment, the continuous usage of medications can accompanied by DNA damage and the accumulation of such damages can cause serious consequences. Antidepressants are long-term used drugs and the incidence of their genotoxic impacts cannot be excluded. Therefore, this work was designed to investigate the possible genotoxic effects of the commonly used antidepressants (fluoxetine and amitriptyline) in adult male rats.
Detection of DNA damage in individual cells was assessed by comet and micronucleus assays in three different cell populations i.e. liver, testis and bone marrow tissues of 24 swiss albino adult male rats. The animals were randomly allocated into three groups of 8 rats ea
... Show MoreShort Multi-Walled Carbon Nanotubes functionalized with OH group (MWCNTs-OH) were used to synthesize flexible MWCNTs networks. The MWCNTs suspension was synthesized using Benzoquinone (BQ) and N, N Dimethylformamide alcohol (DMF) in specific values and then deposited on filter paper by filtration from suspension (FFS) method. Polypyrrole (PPy) conductive polymer doped with metallic nanoparticles (MNPs) prepared using in-situ chemical polymerization method. To improve the properties of the MWCNTs networks, a coating layer of (PPy) conductive polymer, PPy:Ag nanoparticles, and PPy: Cu nanoparticles were applied to the network. The fabricated networks were characterized using an X-ray diffractometer (XRD), UV-Vis. spectrometer, and Ato
... Show More