The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThe work includes synthesis and characterization of some new heterocyclic compounds, as flow: The compound (3) (5-(4-chlorophenyl) -2-hydrazinyl-1,3,4-oxadiazole was synthesized by using two methods; the first method includes the direct reaction between hydrazine hydrate 80% and 5-(4-chlorophenyl)-2- (ethylthio) 1,3,4-oxadiazole (1), the second method involves converting 5-(4-chlorophenyl)-1,3,4-oxadiazol-2-amine (2) to diazonium salt then reducing this salt to compound (3) by stannous chloride. Compound (3) was used as starting material for synthesizing several fused heterocyclic compounds. The compound 6-(4-chlorophenyl)[1,2.4] triazolo [3,4,b][1,3,4] oxadiazole-3-(2H) thione (compound 4) was synthesized from the reaction of compound (3)
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe study aimed to increase the biological value of white bean. The effect of different concentrations 0.01 ,0.02,0.03,and 0.04 M of sodium sulfite solutions for 1hr at 70 ºC on the trypsin inhibitors activity, protein isolate and protein solubility of complete and dehulling white bean flour were studied.Trypsin inhibitors activity were reduced by 42.97, 58.69, 68.59 and 69.58% in complete white bean flour at 0.01 ,0.02, 0.03, 0.04 M respectively, while the corresponding values were 50.43, 61.00, 75.61 and 85.66% respectively in dehulling white bean flour .Protein isolate value was 13.41% and protein solubility was 2.2% in control sample, Furthermore, the using of chemical treatment showed that protein isolate was reduced gradually and
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreIn this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.
Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreSports skills in some individual games require physical and motor qualities to facilitate the process of skill performance and also require the instructor or trainer to use more than one strategy, method and way to bring the performance to the level of mastery and avoid injury. The aim of the research is to know the effect of using special exercises using tools and their effect on teaching the skill of a front shoulder circle. The research hypothesis is that using special exercises with tools has a positive effect on teaching the skill of a front shoulder circle on the rings apparatus. Research method: - The researchers used the experimental method by designing two equal groups, the control and the experimental, to suit the research
... Show MoreThis study was conducted in the Faculty of Agricultural Engineering Sciences - University of Baghdad in the field of sheep and goats in the Department of Animal Production. Effect of different concentrations of bovine albumin on some semen characteristics of frozen rams. Used in this experiment, 3 rams and their ages ranging from 2.5-3 years. The sample of the semen was diluted with Tris dilution with the addition of 10 ml of egg yolk per 100 ml, the sample by 1:1 with the tris and then the collection of sperm samples (Pooling) after the semen was divided into four treatments Control and bovine albumin at concentrations of 5, 7.5 and 10% and then complete dilution 10: 1, at 5C, dilution 20: 1, containing 5% glycerol per 100 ml. The results
... Show More