The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show MoreAn experimental investigation has been made to study the influence of using v-corrugated aluminum fin on heat transfer coefficient and heat dissipation in a heat sink. The geometry of fin is changed to investigate their performance. 27 circular perforations with 1 cm diameter were made. The holes designed into two ways, inline arrangement and staggered in the corrugated edges arrangement. The experiments were done in enclosure space under natural convection. Three different voltages supplied to the heat sink to study their effects on the fins performance. All the studied cases are compared with v-corrugated smooth solid fin. Each experiment was repeated two times to reduce the error and the data recorded after reaching t
... Show MoreThis study was aimed to director wheat production's technical efficiency grown under two irrigation systems(fixed and pivot sprinkler irrigation systems)using random border analysis.Samples were collected randomly from267farmers from Salah Al-Din Governorate/Iraq.The samples were divided into two groups;187farmers used a pivot sprinkler irrigation system with three categories of possession(80,60and120dunums),while the other group used a fixed sprinkler irrigation system with four categories of possession(40,30,20and10dunums).Transcendent production function was used to study the effect of production factors on wheat yield. The results indicated that the mechanization work and the amount of added irrigation water increased by 1% whil
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MoreAn experimental model is used to simulate the loss of soil lateral confinement due to excavation nearby an individual axially loaded pile. The effects of various parameters, such as the horizontal distance of excavation, depth of excavation and pile slenderness ratios are investigated. The experimental analysis results showed the effect of excavation is more remarkable as the horizontal distance of excavation becomes closer to the pile than half pile length. The effect of excavation diminishes gradually as the horizontal distance increases beyond that distance for all the investigated pile slenderness ratios and depths of excavation. The pile head deflection, settlement and bending moments along pile increase with decreasing horizontal d
... Show MoreAccording to the famous saying of the medieval physician Paracelsus, "There is no substance without poison. Only the dose determines the extent of the toxic effect." Here, the effect of monosodium glutamate (MSG) on human health and the risks to the health of its frequent use in the short term was addressed and the long term was evaluated according to the studies of several researchers specializing in this regard. Monosodium glutamate (MSG) is known as one of the most popular food additives that classified as a flavor enhancer. Parts of the evidence were reviewed from the literature explaining its effect on immune system cells in addition to metabolic disorders by exposing individuals to obesity and what is known as metabolic syndrome, as w
... Show MoreDue to the importance of the extraction process in many engineering and medical industries, in addition to great interest in medicinal plants, in this research, microwave-assisted extraction has been applied to extract some active compounds from Rosmarinus officinalis leaves. The optimal extraction conditions were then determined by calculating the ratio and extraction efficiency. The process has also been described through kinetic study by applying five kinetic models, the Hyperbolic diffusion model, Power low model, the First order reaction model, Elovich's model, and Fick's second law diffusion model and determining their compatibility with the studies operation, and determining the kinetic constants for each model. The result
... Show More