Preferred Language
Articles
/
ijs-3919
Identifying Digital Forensic Frameworks Based on Processes Models
...Show More Authors

Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Achieving the rule of tax justice\Adopting the application of the international standard IFRS 15: Applied research in the General Authority for Taxes - Companies Department
...Show More Authors

Abstract:

                The research aims to achieve the basis of tax justice by making a comparison between the tax accounting process according to the application of the International Financial Reporting Standard IFRS15 and the tax accounting procedures currently used in the General Authority for Taxes to determine the annual and total tax differences, to give credibility and enhance transparency in the reports and financial statements of companies Long-term contracts when prepared in accordance with the requirements of applying the international standard IFRS15 “Revenue from Contracts with Customers”, which increases the possibility of relying on them when calculating taxes. Thus, the resea

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Certain Types of Weakly Closed Function
...Show More Authors

The purpose of this paper is to give the condition under which every weakly closed
function is closed and to give the condition under which the concepts of weaklysemi
closed function and weakly pre-closed function are equivalent. Moreover,
characterizations and properties of weakly semi closed functions and weakly preclosed
function was given.

View Publication Preview PDF
Publication Date
Mon Apr 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Bayesian Estimators of the parameter and Reliability Function of Inverse Rayleigh Distribution" A comparison study "
...Show More Authors

     In this paper, Bayesian estimator for the parameter and reliability function of inverse Rayleigh distribution (IRD) were obtained Under three types of loss function, namely, square error loss function (SELF), Modified Square error loss function (MSELF) and Precautionary loss function (PLF),taking into consideration the  informative and non- informative  prior. The performance of such estimators was assessed on the basis of mean square error (MSE) criterion by performing a Monte Carlo simulation technique.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using Entropy and Linear Exponential Loos Function Estimators the Parameter and Reliability Function of Inverse Rayleigh Distribution
...Show More Authors

     This paper is devoted to compare the performance of non-Bayesian estimators represented by the Maximum likelihood estimator of the scale parameter and reliability function of inverse Rayleigh distribution with Bayesian estimators obtained under two types of loss function specifically; the linear, exponential (LINEX) loss function and Entropy loss function, taking into consideration the informative and non-informative priors. The  performance of such estimators assessed on the basis of mean square error (MSE) criterion. The Monte Carlo simulation experiments are conducted in order to obtain the required results. 

 

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Full Text Book Of Minar Congress8
REGULARITY VIA PRE- GENERALIZED OPEN SETS
...Show More Authors

By use the notions pre-g-closedness and pre-g-openness we have generalized a class of separation axioms in topological spaces. In particular, we presented in this paper new types of regulαrities, which we named ρg­regulαrity and Sρg­regulαrity. Many results and properties of both types have been investigated and have illustrated by examples.

View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
New Concepts of Fuzzy Local Function: Types of fuzzy local function
...Show More Authors

The main idea of this paper is to define other types of a fuzzy local function and study the advantages and differences between them in addition to discussing some definitions of finding new fuzzy topologies. Also in this research, a new type of fuzzy closure has been defined, where the relation between the new type and different types of fuzzy local function has been studied

View Publication Preview PDF
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
Solving the Created Equations from Power Function Distribution
...Show More Authors

      In this paper, a new class of ordinary differential equations is designed for some functions such as probability density function, cumulative distribution function, survival function and hazard function of power function distribution, these functions are used of the class under the study. The benefit of our work is that the equations ,which are generated from some probability distributions, are used to model and find  the  solutions  of problems in our lives, and that the solutions of these equations are a solution to these problems, as the solutions of the equations under the study are the closest and the most reliable to reality. The existence and uniqueness of solutions the obtained equations in the current study are dis

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Studying Audio Capacity as Carrier of Secret Images in Steganographic System
...Show More Authors

Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other.  In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus Crossref