Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
The LiCoMnO4 spinel compound was prepared by a sol–gel method. Structural measurements were utilized to investigate the characteristics of LCMO powder. The powder crystallizes in the space group Rd-3m, with a trigonal crystallinity structure, according to XRD analysis (hexagonal axes). SEM images showed that the crystalline grains sizes were about 200 nm - 350 nm, which provides large surface area. The sample had soft magnetic characteristics, according to hysteresis behaviour analysis in the Vibrating Sample Magnetometer (VSM). The prepared material is thought to be a candidate for the applications of energy storage in lithium-ion batteries.
The present study aimed to examine the effect of endosulfan insecticide on some molecular and biochemical parameters in white mice. Thirty mice were separated randomly into three groups for treatment with endosulfan. One group (G1) served as the control, while the other two groups received intraperitoneal injections of endosulfan G2 (3 mg/kg) and G3 (17 mg/kg) twice a week for 21 and 45 days, respectively. A biochemical study by measuring liver function parameters, including (alanine aminotransferase (ALT) and aspartate aminotransferase (AST)) and kidney function parameters, including (Blood Urea and Creatinine) and malondialdehyde (MDA), catalase activity (CAT). This study also tested DNA damage by comet assay (normal%, low%, medium%,
... Show MoreThe need for quick airborne transportation is critical, especially in emergencies. Drones with suspended payloads might be used to accomplish quick airborne transportation. Due to the environment or the drone's motion, the slung load may oscillate and lead the drone to fall. The altitude and attitude controls are the backbones of the drone's stability, and they must be adequately designed. Because of their symmetrical and simple structure, quadrotor helicopters are one of the most popular drone classes. In this work, a genetic algorithm with two weighted terms fitness function is used to adjust a Proportional-Integral-Derivative (PID) controller to compensate for the altitude and attitude controllers in a quadrotor drone with a slun
... Show MoreThe aim of this paper is to introduce and study new class of fuzzy function called fuzzy semi pre homeomorphism in a fuzzy topological space by utilizing fuzzy semi pre-open sets. Therefore, some of their characterization has been proved; In addition to that we define, study and develop corresponding to new class of fuzzy semi pre homeomorphism in fuzzy topological spaces using this new class of functions.
The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreThe objective of this paper is to show modern class of open sets which is an -open. Some functions via this concept were studied and the relationships such as continuous function strongly -continuous function -irresolute function -continuous function.
In this paper, we define certain subclasses of analytic univalent function associated with quasi-subordination. Some results such as coefficient bounds and Fekete-Szego bounds for the functions belonging to these subclasses are derived.
In this paper the wind data that is measured for 12 months (January to December 2011) at Al-Hay district of Wasit province, southern IRAQ country has been analyzed statistically. The wind speed at heights of 10 m above ground level was measured for every 10 minutes interval. The statistical analysis of wind data was performed using WAsP software which is based on Weibull distributions. The Weibull shape and scale parameters is obtained and used in this paper statistics. The achieved results demonstrated that the study area has Annual Mean Energy Production (AMEP) about 219.002 MWh. The computations have been performed on 70m hub‟s height of the turbine and on Earth surface roughness length (0.0, 0.03, 0.1, 0.4, 1.5) m respectively.
We extended the characterization of strict local minimizers of order two in ward,s
theorem for nonlinear problem to a certain class of nonsmooth semi-infinite problems with inequality constraints in the nonparametric constraint case.