Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 08 2021
Journal Name
مجلة العلوم و التكنولوجية للنشاطات البدنية و الرياضية
The effectiveness of using (7E’s) learning cycle in learning a movement chain on the uneven bars in the artistic gymnastics for women
...Show More Authors

Abstract The Object of the study aims to identify the effectiveness of using the 7E’s learning cycle to learn movement chains on uneven bars, for this purpose, we used the method SPSS. On a sample composed (20) students on collage of physical education at the university of Baghdad Chosen as two groups experimental and control group (10) student for each group, and for data collection, we used SPSS After collecting the results and having treated them statistically, we conclude the use 7E’s learning cycle has achieved remarkable positive progress, but it has diverged between to methods, On this basis, the study recommended the necessity of applying 7E’s learning cycle strategy in learning the movement chain on uneven bar

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
International Journal Of Research In Social Sciences And Humanities
CHARACTERISTICS OF THE POWER CHAIN FUNCTION CURVE AND ITS RELATION TO THE ACCURACY OF THE HIGH-JUMP JUMP IN THE HANDBALL
...Show More Authors

The skill high-jump scoring is based on mechanical and physical abilities. The most important of all is the strength used by the player from the moment of preparation to the moment of scoring, which led the researchers to study the characteristics of the series of power chain functions of this skill according to (Biosyn System) The players of the national team's back line have a handball to find out the relationship between the properties of the power chain curve and the accuracy of the high jump to the upper and lower target angles. The aim of the research was to identify the values of the Force Series variables for the skill of the high-jump curve of the handball as well as the relationship between the properties of the power chain functi

... Show More
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
On Fully (m,n)-stable modules relative to an ideal A of
...Show More Authors

Let R be a commutative ring with non-zero identity element. For two fixed positive integers m and n. A right R-module M is called fully (m,n) -stable relative to ideal A of , if for each n-generated submodule of Mm and R-homomorphism . In this paper we give some characterization theorems and properties of fully (m,n) -stable modules relative to an ideal A of . which generalize the results of fully stable modules relative to an ideal A of R.

View Publication Preview PDF
Crossref
Publication Date
Tue Jul 12 2022
Journal Name
Proceedings Of Seventh International Congress On Information And Communication Technology
Identification of Key Criteria of Selecting the Delivery System and Type of Contract in Construction Projects
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Evaluation of Antimicrobial activity of several new Maleimides to Benzothiazole moiety
...Show More Authors

In this work, a series of new maleimides linked to substituted benzothiazole moiety were synthesized. Synthesis of these new cyclic imides were performed via three steps, the first one involved preparation of a series of 2-aminobenzothiazole substituted with different substituents via reaction of different primary aromatic amines with ammonium thiocyanate and bromine in glacial acetic acid. The prepared 2- amino benzothiozoles were introduced in the second step in reaction with maleic anhydride producing a series of N-(substituted benzothiazole-2-yl) maleamic acids.The resulted maleamic acids were dehydrated in the third step via treatment with acetic anhydride and anhydrous sodium acetate to afford a series of the desirable N-(substitu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Improving Customer Value Through the Integral of Techniques Quality Function Deployment and Value Engineering
...Show More Authors

Health service institutions suffer from challenges resulting from the great changes that our world is witnessing today.  This has affected the value that these institutions add to the patient.

This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of The College Of Education For Women
Mulla Jewan’s Methodology in Qur'an Interpretation in the Light of Qur'an Sciences Studies
...Show More Authors

The importance of the interpretation of the Holy Qur’an is that it is a necessity that accompanies Muslim throughout his life, it helps him to solve his problems, it is a way of gaining advanced knowledge, it facilitates the Muslim's understanding of the Holy Qur’an and to know God’s Almighty’s intent in His verses. Since there are so many needs that a person strives to achieve, therefore, the interpretation of the Holy Qur'an would be satisfactory to him and it facilitates the fulfillment of these needs within the limits of legal laws. The aim of the researcher is to get acquainted with the method of that honoured interpreter in his interpretation, and his ability to benefit Muslims in explaining the verses and come to a solutio

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.