Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
The Na-alginate bead is commonly used in biotechnology fields such as adsorption due to ion exchange between Ca and Na with elements. Scanning electron microscopy (SEM-EDX) has proven to be a comparative method in the detections of these adsorbed elements, but the un-flat forming area of beads that can introduce impossible of the detection of element adsorbed. In contrast, X-ray fluorescence (XRF) documents analysis of elements, direct examination, which may analysis the adsorbents of elements. Here, this Study evaluated the possibility by using XRF for the direct analysis for examples of Cd and Ag in a bench stand. This Study compared this to commonly use
... Show More
In this paper, the using of Non-Homogenous Poisson Processes, with one of the scientific and practical means in the Operations Research had been carried out, which is the Queuing Theory, as those operations are affected by time in their conduct by one function which has a cyclic behavior, called the (Sinusoidal Function). (Mt / M / S) The model was chosen, and it is Single Queue Length with multiple service Channels, and using the estimating scales (QLs, HOL, HOLr) was carried out in considering the delay occurring to the customer before his entrance to the service, with the comparison of the best of them in the cases of the overload.
Through the experiments
... Show MoreFes Airport, run by the National Airports‟ Office in Morocco, aspires to be certified by the ISO 9001: 2015 standard; Hereby, it has to meet the needs of the stakeholders‟ expectations in an attempt to promote the airport activities, it has also to take into consideration the risks that are related to the various actors who have well-set priorities and expectations.
The aim of this article is to shed light on the interconnection between the various participants in an attempts to meet the new requirement 4.2 of the ISO 9001: 2015 and to examine the dangers of the integrated management system (QSE) taking into consideration the proposal of an action plan to monitor interfaces, and to promote the application of an integrated
Videogames are currently one of the most widespread means of digital communication and entertainment; their releases are attracting considerable interest with growing number of audience and revenues each year. Videogames are examined by a variety of disciplines and fields. Nevertheless, scholarly attention concerned with the discourse of videogames from a linguistic perspective is relatively scarce, especially from a pragma-stylistic standpoint. This book addresses this vital issue by providing a pragma-stylistic analysis of the digital discourse of two well-known action videogames (First Person Shooter Games). It explores the role of the digital discourse of action videogames in maintaining real-like interactivity between the game and the
... Show MoreThe Multiplicative Cyclic Group has been used to construct a New Digital Algebraic Generator System (NDAGS). This cryptosystem can be classified as a stream cipher cryptosystem. In this paper we will estimate the efficiency and security of the (NDAGS) by using the Basic Efficiency Criteria (BEC). A comparison has made between the some known generators and (NDAGS). The results of applying the BEC and the comparison results proof the high efficiency of the (NDAGS).
A 3D geological model is an essential step to reveal reservoir heterogeneity and reservoir properties distribution. In the present study, a three-dimensional geological model for the Mishrif reservoir was built based on data obtained from seven wells and core data. The methodology includes building a 3D grid and populating it with petrophysical properties such as (facies, porosity, water saturation, and net to gross ratio). The structural model was built based on a base contour map obtained from 2D seismic interpretation along with well tops from seven wells. A simple grid method was used to build the structural framework with 234x278x91 grid cells in the X, Y, and Z directions, respectively, with lengths equal to 150 meters. The to
... Show MoreIn this work, a novel design for the NiO/TiO2 heterojunction solar cells is presented. Highly-pure nanopowders prepared by dc reactive magnetron sputtering technique were used to form the heterojunctions. The electrical characteristics of the proposed design were compared to those of a conventional thin film heterojunction design prepared by the same technique. A higher efficiency of 300% was achieved by the proposed design. This attempt can be considered as the first to fabricate solar cells from highly-pure nanopowders of two different semiconductors.
Optical Mark Recognition (OMR) is the technology of electronically extracting intended data from marked fields, such as squareand bubbles fields, on printed forms. OMR technology is particularly useful for applications in which large numbers of hand-filled forms need to be processed quickly and with a great degree of accuracy. The technique is particularly popular with schools and universities for the reading in of multiple choice exam papers. This paper proposed OMRbased on Modify Multi-Connect Architecture (MMCA) associative memory, its work in two phases: training phase and recognition phase. The proposed method was also able to detect more than one or no selected choice. Among 800 test samples with 8 types of grid answer sheets and tota
... Show MorePerformance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigat
... Show More