The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Objectives: To determine the effectiveness of physical education program on the domains of the university
students attitudes of physical activity and health, physical activity and mental health, physical activity and nutrition
toward physical fitness.
Methodology: A quasi-experimental design is carried out throughout the present study with the application of
test-retest approach through the period from February 3rd 2013 to June 30th 2013. The study is conducted on
purposive sample of(40) Undergraduate Students at the College of Science University of Baghdad . The sample is
Consisted of (20) males and (20) females. Questionnaire of two main parts, Personal and demographic
information and students' attitudes about phys
Recently, research has focused on non-thermal plasma (NTP) technologies as a way to remove volatile organic compounds from the air stream, due to its distinctive qualities, which include a quick reaction at room temperature. In this work, the properties of the plasma generated by the dielectric barrier discharge (DBD) system and by a glass insulator were studied. Plasma was generated at different voltages (3, 4, 6, 7, 8 kV ) with a fixed distance between the electrodes of 5 mm, and a constant argon gas flow rate of (2.5) I/min. DBD plasma emission spectra were recorded for each voltage. The Boltzmann plot method was used to calculate the electron temperature in the plasma ( ), and the Stark expansion method was used to calculate the elec
... Show MoreThe nonlinear optical properties for polymeric (PMMA) doping with dye Rhodmine (R3Go) has been studied .The samples are prepared by normal polymerization method with concentrations of 5x10-5mol/l and a thickness of 272.5µm.
Plasma effect was studied on samples prepared before and after exposure to the Nd: YAG laser for three times 5, 10 and 15 minutes. Z-Scan technique is used to determine the nonlinear optical properties such as; refractive index (n2) and the coefficient of nonlinear absorption (β). It was found that the nonlinear properties is change by increasi
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreThe research utilizes data produced by the Local Urban Management Directorate in Najaf and the imagery data from the Landsat 9 satellite, after being processed by the GIS tool. The research follows a descriptive and analytical approach; we integrated the Markov chain analysis and the cellular automation approach to predict transformations in city structure as a result of changes in land utilization. The research also aims to identify approaches to detect post-classification transformations in order to determine changes in land utilization. To predict the future land utilization in the city of Kufa, and to evaluate data accuracy, we used the Kappa Indicator to determine the potential applicability of the probability matrix that resulted from
... Show MoreModeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreThe relative strength index (RSI) is one of the best known technical analysis indicators; it provides the speculators by prior signals about the future stock’s prices, and because the speculations in shares of companies which listed in the Iraq Stock Exchange have a high degree of risk, like risk of shares prices felling, so the speculators became committed to use some methods to reduce these risks, and one of these methods is the technical analysis by using the relative strength index (RSI) which enable the speculators of choosing the right time for buy and sell the stocks and the right time to enter or leave the market by using the historical rice data. And from here the problem of the research formulated as “Is the using of
... Show MoreThe concepts of higher Bi- homomorphism and Jordan higher Bi- homomorphism have been introduced and studied the relation between Jordan and ordinary higher Bi- homomorphism also the concepts of Co- higher Bi- homomorphism and Co- Jordan higher Bi- homomorphism introduced and the relation between them in Banach algebra have also been studied.