Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. In this research, for the segmentation of anatomical structures in medical images three approaches were implemented and compared like (original snake model, distance potential force model and Gradient Vector Flow (GVF) snake model). We used Computed Tomography image (CT) for our experiments. Our experiments show that original snake model has two problems; first is the limited capture range and the second is the poor convergence. Distance potential force model solved only the first problem of original snake and failed with second problem. Gradient Vector Flow (GVF snake) provides a go
... Show MoreIn this research ,we will study the phenomenon of dust storms for all types
(Suspended dust , rising dust , dust storm) , and its relationship with some climate
variables (Temperature , rainfall ,wind speed , Relative humidity ) through
regression models to three different locations ( Kirkuk , Rutba , Diwaniya ) almost
covering Iraq area for the period (1981 – 2012) . Time series has been addressing the
phenomenon of storms and climate variables for the time period under study to
attain the best models for long range forcast to the dust storms.
Passive optical network (PON) is a point to multipoint, bidirectional, high rate optical network for data communication. Different standards of PONs are being implemented, first of all PON was ATM PON (APON) which evolved in Broadband PON (BPON). The two major types are Ethernet PON (EPON) and Gigabit passive optical network (GPON). PON with these different standards is called xPON. To have an efficient performance for the last two standards of PON, some important issues will considered. In our work we will integrate a network with different queuing models such M/M/1 and M/M/m model. After analyzing IPACT as a DBA scheme for this integrated network, we modulate cycle time, traffic load, throughput, utilization and overall delay
... Show Moreيمثل الأخذ بالنظام الفيدرالي أطاراً تنظيمياً لشكل الدولة و مرحلة تحول مهمة في بنية الدولة العامة في مختلف مجالاتها، فالانتقال من المركزية في أدارة الشؤون العامة للدولة الى النمط الفيدرالي يمثل تحولا بنيوياً وسيكولوجياً ،حيث يكون هنالك توزيع مكاني - عمودي للسلطة والثروة بين الوحدات المكونة للدولة بشكل يختلف كليا عن الحالة المركزية، ونجد صور تنظيمية عديدة تتأسس ضمن اطار الفيدرالية العام ،
... Show MoreThe aim of this study is to estimate the survival function for the data of lung cancer patients, using parametric methods (Weibull, Gumbel, exponential and log-logistic).
Comparisons between the proposed estimation method have been performed using statistical indicator Akaike information Criterion, Akaike information criterion corrected and Bayesian information Criterion, concluding that the survival function for the lung cancer by using Gumbel distribution model is the best. The expected values of the survival function of all estimation methods that are proposed in this study have been decreasing gradually with increasing failure times for lung cancer patients, which means that there is an opposite relationshi
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreThis article deals with estimations of system Reliability for one component, two and s-out-of-k stress-strength system models with non-identical component strengths which are subjected to a common stress, using Exponentiated Exponential distribution with common scale parameter. Based on simulation, comparison studies are made between the ML, PC and LS estimators of these system reliabilities when scale parameter is known.
Background:Â Various fluids in the oral environment can affect the surface roughness of resin composites. This in vitro study was conducted to determine the influence of the mouth rinses on surface roughness of two methacrylate-based resin (nanofilled and packable composite) and siloraine-based resin composites.
Materials and methods: Disc-shaped specimens (12 mm in diameter and 2mm in height) were prepared from three types of composi
... Show MoreThis study aims at identifying the correlation between digital transformation and knowledge building in educational institutions, as well as finding the influence relationship between digital transformation and knowledge building in educational institutions and knowing the dimensions of digital transformation that have the most impact in improving the level of knowledge building, and by adopting the methodological descriptive analysis method in the Ministry of Education. Education and educational institutions in Baghdad. This research deals with digital transformation as an independent variable according to two dimensions (digital adaptability and digital readiness). Knowledge building was adopted as an approved variable using the s
... Show More