The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The cancer is one of the biggest health problems that facing the world . And the bladder cancer has a special place among the most spread cancers in Arab countries specially in Iraq and Egypt(2) . It is one of the diseases which can be treated and cured if it is diagnosed early . This research is aimed at studying the assistant factors that diagnose bladder cancer such as (patient's age , gender , and other major complains of hematuria , burning or pain during urination and micturition disorders) and then determine which factors are the most effective in the possibility of diagnosing this disease by using the statistical model (logistic regression model) and depending on a random sample of (128) patients . After
... Show MorePurpose: The research aims to diagnose the current availability of knowledge workers characteristics and the role of these characteristics in knowledge acquision in the city of Sulaimaniya Directorate of Electricity, and to identify the differences between personal and occupational characteristics of a sample of research and its impact on the availability of such properties.Design/methodology/approach :to achieve the objectives of the research questionnaire was developed especially for it and then distributed to a sample of engineers and technicians working in the Directorate of Electricity city of Sulaimaniya, where the sample of the research (52) respondents.
Findings: the most important conclusions reached
... Show More
At the local level in the early 1990s first established an Islamic bank 1993 is called Iraqi Islamic bank and was established by Dr. abdullatef hmim and with capital of 200 Million Iraqi dinars .
After 2003 began the attention of Iraqis tend to create Islamic banks until now up to 30 banks in the present , He confirmed Mr. Governor of the Iraqi Central Bank recently that there is more than 40 iintroduction licence to establish an Islamic bank in Iraq , That banking activity which is compatible with Sharia law widely welcomed by savers and those in need for more development and modernization in order to gain a greater share within the Iraqi market , and allowed the Iraqi Central Bank in recent years
... Show MoreAbstract
Although the subject of biofuels industry is linked directly to the energy sector, but has links and numerous indirect effects, in particular effects on the environment and agriculture, this study (opportunities and challenges of biofuels industry and impact on the development of the agricultural sector in developing countries) a modest step to identify the industry in detail and identify the types of products and raw materials entering, then define or limit the positive and negative impacts of this industry in General and for specific products In particular, detailed, and then flip all those effects on the agricultural sector in developing countries can benef
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreDetermining the face of wearing a mask from not wearing a mask from visual data such as video and still, images have been a fascinating research topic in recent decades due to the spread of the Corona pandemic, which has changed the features of the entire world and forced people to wear a mask as a way to prevent the pandemic that has calmed the entire world, and it has played an important role. Intelligent development based on artificial intelligence and computers has a very important role in the issue of safety from the pandemic, as the Topic of face recognition and identifying people who wear the mask or not in the introduction and deep education was the most prominent in this topic. Using deep learning techniques and the YOLO (”You on
... Show MoreVol. 6, Issue 1 (2025)
Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system
... Show More