The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
One of the most important problems that would continuously face the Higher education organizations is how to improve the service level presented by them, and how this can lead to increase demand for services of this organizations.As this issue has exhausted many organizations pushed some of them to withdraw from the market Because of weaknesses in their services. Here lies the importance of this matter to be given more attention in order to maintain the organization competitive position. According to that, The selection of the research title (The Impact of Quality on the Level of the University Service Request) which seeks to measure the impact of service quality on the level of demand, At a time when world&
... Show MoreThis research aims to show the sight at the importance of the private banking sector in Iraq and its role in financing of the investment projects , of the ability of Central Bank's decision to increase the minimum limit of capital for private banks to provide support to the economic activity and the development in Iraq. In addition to illustrate the importance of the capital increase, with a, and taking into notice the most important determinants that can stand in front of these banks in the beginning of the decision implementation, which in turn can lead to the most important proceedings that can contribute in the support of banks to implementation the decision. Also, the research has highlighted the most important ways through wh
... Show MoreThe aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreIt is found in the book "Ibn Aqeel: Alfiya Ibn Malek" that there are some linqustical aspected are related to the native tribal speakers like Tamim or Tie or some others. Sometimes in the book he said "some Arabian said without mentioning the name of the tribe.
As weel, he hasn’t mentioned the accent but he does mention the language. In the book, he has brought back the most important and the biqqest Arabian tribes suchas tribes of Hegaz, Tamim, Hatheyal, son of Anber, Tie, Rabia Bin Wael, Bani Katham, Au there, Bani AL Harth, Bani Kalb, Bani Hgim, Zabid, Hamedan, Alia Qais, Bani Ameer and many others. However, the most mentioned tribes were Hegaz and Tami.
Hence, the importance of the book expiain Ibn Aqeel by mentioning these A
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
In this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Cen
... Show MoreIn this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.
A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of
... Show MoreAs a result of the exacerbation of the problem of water pollution, research was directed towards studying the treatment using ceramic membranes, which proved to be highly effective in treating all water sources. The research aims to study the possibility of preparing a new type of ceramic membranes from Syrian zeolite that was not previously used in this field. In this research, ceramic membranes were prepared from Syrian raw zeolite in several stages. Zeolite sample was characterized, grinded, mixed with boric acid, pressed to form desks, treated thermally according to experiment program, finally coated with silver nanoparticles. Specifications of prepared membranes were determined according to reference methods, effectiveness of prepar
... Show MoreIn this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show MoreThe aim of the research is to investigate the effect of cold plasma on the bacteria grown on texture of sesame paste in its normal particle and nano particle size. Starting by using the image segmentation process depending on the threshold method, it is used to get rid of the reflection of the glass slides on which the sesame samples are placed. The classification process implemented to separate the sesame paste texture from normal and abnormal texture. The abnormal texture appears when the bacteria has been grown on the sesame paste after being left for two days in the air, unsupervised k-mean classification process used to classify the infected region, the normal region and the treated region. The bacteria treated with cold plasma, t
... Show More