Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
The main objectives of this pepper are to introduce new classes. We have attempted to obtain coefficient estimates, radius of convexity, Distortion and Growth theorem and other related results for the classes
Abstract
The research aims to diagnose the reality of applying the eighth requirement (operation) of the business continuity management system according to the international standard (ISO 22301: 2019), in the General Tax Authority, which is related to planning, implementing and controlling specific processes and procedures to address risks and opportunities, and the research adopted the checklist of the standard ( ISO 22301: 2019), in obtaining information, to measure the extent of application and documentation, the percentages and the weighted arithmetic mean were relied upon, and the research reached a set of result
... Show MoreThe most frequently diagnosed condition in women at the age of reproduction is the polycystic ovarian syndrome (PCOS).it could be related to a complex endocrine condition, due to its heterogeneity and uncertainty about its etiology, as the clinical highlights of PCOS incorporate those related to reproductive signs such as decreased frequency of ovulation, irregular menstrual cycles, decreased fertility. Carnitine plays a substantial role in weight loss, glucose tolerance, insulin function and fatty acid metabolism. Thus carnitine plays a crucial role in controlling obesity, insulin resistance, oxidative stress that are associated with PCOS .While, AGEs are a diverse group of reactive molecules that are formed end
... Show MorePeople are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o
... Show MoreRecently, much secured data has been sent across the internet and networks. Steganography is very important because it conceals secure data in images, texts, audios, protocols, videos, or other mediums. Video steganography is the method of concealing data in frames of video format. A video is a collection of frames or images used for hidden script messages. This paper proposes a technique to encrypt secret messages using DNA and a 3D chaotic map in video frames using the raster method. This technique uses three steps: Firstly, converting video frames into raster to extract features from each frame. Secondly, encryption of secret messages using encoded forms of DNA bases, inverse/inverse complements of DNA, a
... Show MoreWe obtain the coefficient estimates, extreme points, distortion and growth boundaries, radii of starlikeness, convexity, and close-to-convexity, according to the main purpose of this paper.
2D Electrical Resistivity has been applied at three selecting areas within the study area using Dipole-dipole and Wenner arrays with an a-spacing of 1 m, and the profile length was 120 m for both. The total data points were 4455 reads for Dipole-dipole, and the total data points for Wenner were 2340 reads, and the depth of each array was 15.4 m and 20.2 m, respectively. The 2D inverse results indicate the resistivity anomalies approximately at depth (2 - 7.8) m formed as a weakness zone lies within the quaternary and Injana Formation deposits and interbedded with secondary gypsum and gypcretes. Additionally, the inverse resistivity distribution model demonstrated that the area is impacted by groundwater that is interaction wit
... Show MoreThe coordination ability of the azo-Schiff base 2-[1,5-Dimethyl-3-[2-(5-methyl-1H-indol-3-yl)-ethyl imino]-2-phenyl-2,3-dihydro-1H-pyrazol-4-ylazo]-5- hydroxy-benzoic acid has been proven in complexation reactions with Co(II), Ni(II), Cu(II), Pd(II) and Pt(II) ions. The free ligand (LH) and its complexes were characterized using elemental analysis, determination of metal concentration, magnetic susceptibility, molar conductivity, FTIR, Uv-Vis, (1H, 13C) NMR spectra, mass spectra and thermal analysis (TGA). The results confirmed the coordination of the ligand through the nitrogen of the azomethine, Azo group (Azo) and the carboxylate ion with the metal ions. The activation thermodynamic parameters, such as ΔE*, ΔH*, ΔS*, ΔG*and K are cal
... Show MoreIn this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreIn this paper, we derive some subordination and superordination results for certain subclasses of p− valent analytic functions that defined by generalized Fox-wright functions using the principle of differential subordination, ----------producing best dominant univalent solutions. We have also derived inclusion relations and solved majorization problem.