The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The objective of this study is to measure the impact of financial development on economic growth in Iraq over the period (2004-2018) by applying a fully corrected square model (FMOLS) Whereas, a set of variables represented by (credit-to-private ratio of GDP, the ratio of money supply in the broad sense of GDP, percentage of bank deposits from GDP) were chosen as indicators for measuring financial development and GDP to measure economic growth.
Major tests have been carried out, such as the stability test (Unite Root Test), the integration test (Cointegration). Results of the study showed that there
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
this research seeks to shed light on the study of the impact of Putinism on the Russian-Ukrainian war that broke out in early 2022, by studying the contents of the speeches of Russian President Vladimir Putin before the start of the war. This research uses the structural approach in analyzing the components of the Russian political regime. The research tools used in this research include case studies, content analysis of Russian speeches, and personal meetings of researchers and specialists in Russian affairs. It sums up a number of important conclusions, most notably are : 1) Putinism is a totalitarian regime that includes the political doctrine during the era of Russian President Vladimir Putin. 2) Duginism represents the totality of t
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
The current research aims to find out the role of transformational leadership in decision-making wise, to cope with the decline in some of the banking performance indicators as a result of the absence of the modern concept of the leadership of those so-called B (Transformational Leadership) and preventing benefit from the advantages in the banks, and I test the research on a sample of the Iraqi private banks through applied to a sample (77) Mdermvud and Associate Director and Advisor to the Chairman of the Department, the distributors (7) banks, and used the head of the questionnaire as a tool to collect data and information. For the purpose of access to the results, the research sought to test two hypotheses two main hypotheses sub pop
... Show More The study (Quality in the Industrial Products Designs and its Reflection on Achieving Competitive Advantage) focused on developing the products in a way that satisfies human desires through the impact of technology on products design systems and performance enhancement. The study question is: how to effectively achieve quality in industrial products designs that influences competitiveness? The aim of the research is to show the design contexts for the product and its reflection on competitiveness. The study is limited to (LG) products in 2017-2018. The results and conclusions reached at by the researcher are included in the study.
The sample models adopted contexts, forms and relational relations transcending traditional contex
The demand for expatriate labor to Iraq increased after 2003 as a result of the openness that Iraq experienced, but this expatriate labor, which was requested at an increasing rate, has had economic, social, and political effects on the Iraqi economy in general, and the Iraqi labor market in particular. This is due to the high rates of unemployment, as most of these expatriate workers cause competition to local labor, and thus cause repercussions on the Iraqi economy as a whole, except for those expatriate workers coming with companies working in the oil sector. Iraq's GDP
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThin films of pure polycarbonate (PC) with anthracene doping PC films for different doping ratios (10, 20, 30, 40, 50 and 60 ml) were prepared by using a casting method. The influence of anthracene doping ratio on photo-fries rearrangement of polycarbonate was systematic investigated. Furthermore, pure PC and anthracene doping PC films were irradiated via UV light at a wavelength (254 nm) for different periods (5, 240, 288, and 360 hrs). The photo-fries rearrangement occurring in pure PC and anthracene doping PC films were monitored using UV and FTIR spectroscopies. The photo-fries rearrangement leads to scission the carbonate linkage and formation phenylsalicylate and dihydroxybenzophenes. The result of the UV spectrum confirms disappea
... Show MoreAcute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.
This was a single hospital-based prospective study with a durat