Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando
... Show MoreInformation is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency
... Show MoreRecently, numerous the generalizations of Hurwitz-Lerch zeta functions are investigated and introduced. In this paper, by using the extended generalized Hurwitz-Lerch zeta function, a new Salagean’s differential operator is studied. Based on this new operator, a new geometric class and yielded coefficient bounds, growth and distortion result, radii of convexity, star-likeness, close-to-convexity, as well as extreme points are discussed.
In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
In this paper, a new class of harmonic univalent functions was defined by the differential operator. We obtained some geometric properties, such as the coefficient estimates, convex combination, extreme points, and convolution (Hadamard product), which are required
In this paper, we analyze several aspects of a hyperbolic univalent function related to convexity properties, by assuming to be the univalent holomorphic function maps of the unit disk onto the hyperbolic convex region ( is an open connected subset of). This assumption leads to the coverage of some of the findings that are started by seeking a convex univalent function distortion property to provide an approximation of the inequality and confirm the form of the lower bound for . A further result was reached by combining the distortion and growth properties for increasing inequality . From the last result, we wanted to demonstrate the effect of the unit disk image on the condition of convexity estimation
... Show MoreContracting companies play a prominent role today in economic activity, due to their contribution to the implementation of major construction projects which together constitute the infrastructure of society. Most construction projects also suffer from exceeding the time and cost specified and planned for the completion of the project, and this comes for several reasons, including the work environment, country conditions, The method of managing project costs and the techniques used in its implementation Accordingly, the concepts of lean construction came, which help in addressing the causes of waste, both in time and cost, in addition to the fact that project management needs techniques that are useful in controlling the control and manag
... Show MoreThe study area, Tlul Al-Baj, suffers from a shortage of fresh water and most people depend on groundwater for different uses (drinking, domestic, irrigation, etc.).
The present research aims to select the most suitable wells for desalination and production of potable water in Tlul Al-Baj area.
Twenty-two samples of groundwater were collected to evaluate the hydrochemical properties of groundwater in the shallow aquifer in the area and to determine their suitability for desalination purposes. The study included measuring the physicochemical characteristics of groundwater, such as total hardness (TH), total dissolved solids(TDS), sodium adsorption ratio (SAR), sodium ratio (Na%), turbidity (Tur), pH…etc. Chemical anal
... Show MoreThe H-Point Standard Addition Method (H-PSAM) has been applied for spectrophotometric simultaneous determination of Cimetidine and Erythromycin ethylsuccinate using Bromothymol Blue (BTB) as a chromogenic complexing agent in a buffer solution at pH 5.5.
The 2D resistivity imaging technique was applied in an engineering study for the investigation of subsurface weakness zones within University of Anbar, western Iraq. The survey was carried out using Dipole-dipole array with an n-factor of 6 and a-spacing values of 2 m and 5 m. The inverse models of the 2D electrical imaging clearly show the resistivity contrast between the anomalous parts of the weakness zones and the background resistivity distribution. The thickness and shape of the subsurface weakness zones were well defined from the 2D imaging using Dipole-dipole array of 2 m a-spacing. The thickness of the weakness zone ranges between 9.5 m to 11.5 m. Whereas the Dipole-dipole array with a-spacing of 5 m and n-factor of 6 allocated
... Show More