The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The research aims to clarify the COBIT5 framework for IT governance and to develop of a criterion based on Balanced Scorecard that contributes in measuring the performance of IT governance. To achieve these goals, the researchers adopted the deductive approach in the design of balanced scorecard to measure the IT governance at the Bank of Baghdad that was chosen because it relied heavily on IT.
The research has reached a number of conclusions, the most important of which is that the performance of IT department in the Bank of Baghdad falls within the good level that requires constant monitoring, the most committed items of Balanced Scorecard by the Bank were customer, internal operation, growth and finally the financial item; IT
... Show MoreIn this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substitu
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe role of internal control is based on the effectiveness of the budget through an analysis of the reality of the budget in the research sample as it was studied in the preparation and preparation stages and the implementation stage. The sample showed that the sample did not comply with what is stated in the Ministry of Finance publication of instructions and ceilings. In the process of preparing and resulting from the occurrence of deviations in large proportions both in the discussion of the Ministry of Finance or when implementation as a low rate of implementation and the absence of allocations for some items, although there is a need for them as well as the transfer of large proportions of transfers both up or down and the purpose o
... Show MoreThe aim of the research is to identify the imaginative thinking skills included in the content of the chemistry textbook for fifth-grade students in biological sciences at the preparatory stage, which is approved by the Ministry of Education, General Directorate of Curricula in the academic year 2020-2021. To achieve the objective of the study, the researcher depends on the previous studies in the field and content of imaginative thinking skills for preparing a list of skills that includes (3) essential skills and (11) sub-skills and (28) items related to all skills. The researcher adopted the analytical descriptive approach because of its appropriation of the goals of the research. Then the researcher analyzed the content of the book de
... Show MoreThe current research aims to identify the extent to which cognitive economics skills are included in the content of the chemistry textbook for the third intermediate grade, and the research sample was represented in the chemistry textbook for the third intermediate grade. A list of knowledge economy skills was prepared (6) main skills (basic skills, communication skills, thinking skills, work skills Group, information-gathering skill, behavioral skills (and (20) sub-skills) (reading, writing, operations, computer skills and employability, oral expression and written communication, dialogue, persuasion, influence and arousal, analysis, problem-solving, decision-making, suggestions and hypotheses and employing them. Controlling, directing
... Show MoreBackground: Assessment of function of the right side of the heart in cases of left ventricular dysfunction has been widely studied but the sensitive and specific echocardiographic parameter to be tested is still a matter of controversy. Right ventricular function is related to left ventricular function by ventricular independence so function of both should be assessed carefully. The objective of this study was to evaluate the effects of left ventricular systolic dysfunction on right ventricular systolic and diastolic functions and pulmonary pressure using conventional and tissue Doppler echocardiography. Patients and Methods: Sixty patients (39 males and 21 females) with heart failure due to left ventricular systolic dysfunction
... Show MoreThis deals with estimation of Reliability function and one shape parameter (?) of two- parameters Burr – XII , when ?(shape parameter is known) (?=0.5,1,1.5) and also the initial values of (?=1), while different sample shze n= 10, 20, 30, 50) bare used. The results depend on empirical study through simulation experiments are applied to compare the four methods of estimation, as well as computing the reliability function . The results of Mean square error indicates that Jacknif estimator is better than other three estimators , for all sample size and parameter values
At the last years, the interesting of measurement spicilists was increased to study differential item functioning (DIF) wich is reflect the difference of propability true response for test item from subgroups which have equal level of ability . The aims of this research are, inform the DIFat Namers’scale(2009) for mental health to prepare students and detect items that have DIF. Sample research contants (540) students, we use Mantel- Haenzel chi-square to detect DIF. The results are point to there are (26) items have DIF according to gender which are delated form the scale after that.