Fraud crimes, which is a form of crimes against the funds in public office, is one of the crimes of traditional and cutting-edge in the same time, but it took a distinct character from other traditional crimes because of what is based upon, behavioral fundamentals and foundations and expressive image of personal qualities, concentrated in the mental work, the inventive sophistication, and skillful abilities of the perpetrators of these crimes, in addition to what is owned by crooks today a behavioral ability represented in underestimating laws and instructions. Fraud is considered one of the organized crime methods It is the most important method of its methods, all crimes practiced by the cro
... Show MoreBuilding natural period, T, is a key character in building response for wind and seismic induced forces. In design practice, the period, T, is either estimated from empirical relations proposed by the design codes or determined from analytical or numerical models. The effect of the soil-structure interaction is usually neglected in the design practice and analysis models. This paper uses a sophisticated finite element simulation to investigate the effect of soil-structure modeling on the fundamental period of RC buildings subjected to wind and seismic induced forces. A typical interior building frame has been imitated using the frame element for beams and columns with constrains to mo
The cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreYucca gloriosa Variegata L. is a stemless. The whole plant of Y. gloriosa L. has vast medicinal uses. TheNative Americans and North New Mexico used a tea from the leaves and roots to treat asthma, headache,wound healing. As well as it was being consumed as daily dietary. All part of Y. gloriosa L. is rich in saponinsteroidal glycosides. Saponin extracts are well-known to be highly toxic. Hence, present study was carriedout to investigate the toxicity of saponin and estimate the LD50 value which helps in determining the safedose range for the drug that be used, as well as to determine hematological aspects and examine histologicaleffect. Different concentrations of saponin extract were injected into male mice (10,000, 8000, 6000, 400
... Show MoreLet