Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Measuring the Performance of IT Governance According to COBIT5 Framework by Using the Balanced Scorecard
...Show More Authors

The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.

The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Evaluation of Antimicrobial activity of several new Maleimides to Benzothiazole moiety
...Show More Authors

In this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substitu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 27 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Internal audit of spending units and its impact on the efficiency of the federal budget
...Show More Authors

The role of internal control is based on the effectiveness of the budget through an analysis of the reality of the budget in the research sample as it was studied in the preparation and preparation stages and the implementation stage. The sample showed that the sample did not comply with what is stated in the Ministry of Finance publication of instructions and ceilings. In the process of preparing and resulting from the occurrence of deviations in large proportions both in the discussion of the Ministry of Finance or when implementation as a low rate of implementation and the absence of allocations for some items, although there is a need for them as well as the transfer of large proportions of transfers both up or down and the purpose o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the Content of the Chemistry Book for the Fifth Grade of Preparatory School According to Imaginative Thinking Skills
...Show More Authors

The aim of the research is to identify the imaginative thinking skills included in the content of the chemistry textbook for fifth-grade students in biological sciences at the preparatory stage, which is approved by the Ministry of Education, General Directorate of Curricula in the academic year 2020-2021. To achieve the objective of the study, the researcher depends on the previous studies in the field and content of imaginative thinking skills for preparing a list of skills that includes (3) essential skills and (11) sub-skills and (28) items related to all skills. The researcher adopted the analytical descriptive approach because of its appropriation of the goals of the research. Then the researcher analyzed the content of the book de

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Analyzing the content of the chemistry textbook for the third intermediate grade according to the skills of knowledge economy
...Show More Authors

The current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
World Heart Journal
Echocardiographic Evaluation of the Right Ventricular Function in a Sample of Iraqi Patients with Left Ventricular Dysfunction
...Show More Authors

Background: Assessment of function of the right side of the heart in cases of left ventricular dysfunction has been widely studied but the sensitive and specific echocardiographic parameter to be tested is still a matter of controversy. Right ventricular function is related to left ventricular function by ventricular independence so function of both should be assessed carefully. The objective of this study was to evaluate the effects of left ventricular systolic dysfunction on right ventricular systolic and diastolic functions and pulmonary pressure using conventional and tissue Doppler echocardiography. Patients and Methods: Sixty patients (39 males and 21 females) with heart failure due to left ventricular systolic dysfunction

... Show More
Scopus (2)
Scopus
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
A Comparison of the Methods for Estimation of Reliability Function for Burr-XII Distribution by Using Simulation.
...Show More Authors

This deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
Differential Item Functioning at the scal of mental health
...Show More Authors

At the last years, the interesting of measurement spicilists was increased to study differential item functioning (DIF) wich is reflect the difference of propability true response for test item from subgroups which have equal level of ability . The aims of this research are, inform the DIFat Namers’scale(2009) for mental health to prepare students and detect items that have DIF. Sample research contants (540) students, we use Mantel- Haenzel chi-square to detect DIF. The results are point to there are (26) items have DIF according to gender which are delated form the scale after that.

 

View Publication Preview PDF