Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.
The electric quadrupole moments for some scandium isotopes (41, 43, 44, 45, 46, 47Sc) have been calculated using the shell model in the proton-neutron formalism. Excitations out of major shell model space were taken into account through a microscopic theory which is called core polarization effectives. The set of effective charges adopted in the theoretical calculations emerging about the core polarization effect. NushellX@MSU code was used to calculate one body density matrix (OBDM). The simple harmonic oscillator potential has been used to generate the single particle matrix elements. Our theoretical calculations for the quadrupole moments used the two types of effective interactions to obtain the best interaction compared with the exp
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the
... Show MoreBased on the needs of the scientific community, researchers tended to find new iterative schemes or develop previous iterative schemes that would help researchers reach the fixed point with fewer steps and with stability, will be define in this paper the multi_implicit four-step iterative (MIFSI) which is development to four-step implicit fixed point iterative, to develop the aforementioned iterative scheme, we will use a finite set of projective functions ,nonexpansive function and finite set from a new functions called generalized quasi like contractive which is an amalgamation of quasi contractive function and contractive like function , by the last function and a set of sequential organized steps, we will be able to prove the existen
... Show MoreThe m-consecutive-k-out-of-n: F linear and circular system consists of n sequentially connected components; the components are ordered on a line or a circle; it fails if there are at least m non-overlapping runs of consecutive-k failed components. This paper proposes the reliability and failure probability functions for both linearly and circularly m-consecutive-k-out-of-n: F systems. More precisely, the failure states of the system components are separated into two collections (the working and the failure collections); where each one is defined as a collection of finite mutual disjoint classes of the system states. Illustrative example is provided.
The aim of this research was to analyze the financial reporting requirements of segmental information that stipulated by the Iraqi accounting rules, investigating the extent of it compliance with the requirements of the International Financial Reporting Standard No.8 (IFRS 8) and the Statement of Financial Standards No.131 (SFAS 131). Also the research aimed to identify the segmental disclosure practices in listed corporations on Iraq Stock Exchange (ISX), basing on a hypotheses said that “the insufficient of Iraqi financial reporting requirements of segmental information affect<
... Show MoreAnalytical field target function has been considered to represent the axial magnetic field distribution of double polepiece symmetric magnetic lens. In this article, with aid of the proposed target function, the syntheses procedure is dependent. The effect of the main two coffectin optimization parameters on the lens field distribution, polepieces shape, and the objective focal prosperities for lenses operated under zero magnification mode has been studied. The results have shown that the objective properties evaluated in sense of the inverse design procedure are in an excellent correspondence with that of analysis approach. Where the optical properties enhance as the field distribution of the electron lens distributed along a narrow axi
... Show MoreUrban morphological approach (concepts and practices) plays a significant role in forming our cities not only in terms of theoretical perspective but also in how to practice and experience the urban form structures over time. Urban morphology has been focused on studying the processes of formation and transformation of urban form based on its historical development. The main purpose of this study is to explore and describe the existing literature of this approach and thus aiming to summarize the most important studies that put into understanding the city form. In this regard, there were three schools of urban morphological studies, namely: the British, the Italian, and the French School. A reflective comparison between t
... Show MoreHypertension is one of the leading causes of the global burden of disease, which causes serious health problems. The aim of this study is to investigate the lipid profile levels in sera of Iraqi hypertensive patients by measuring Total cholesterol (TC), triglyceride (TG) and low density lipoproteins (LDL) and kidney function levels by measuring uric acid, urea and creatinine. Seventy five individuals of Iraqi adults (Males) were divided into three groups: 25 hypertensive patients with duration of disease (1-10) year (group 1), 25 hypertensive patients with duration of disease (11-30) year (group 2) and 25 normal individuals as control group (group3). The findings indicate that serum (TC, TG and LDL) levels were significantly elevated (
... Show More