The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
This study examined the effect of elements of internal marketing activities on customer satisfaction through an exploratory study of banking services in the city of Baghdad, if the research problem crystallized by asking a group of questions, the most important (is there a correlation and impact between the dimensions of internal marketing and customer satisfaction, this study aims to determine The effect of internal communication, training and internal market research on customer satisfaction, represented by the quality of service, loyalty and market share, and embodied the objective of this study to identify the level of availability of internal marketing activities and programs in the research banks, data were collected using
... Show MoreHepatitis B virus (HBV) infection is a significant global health problem. Populations of different ethnicities show great heterogeneity in HBV genotype frequency distributions. A cross-sectional study was conducted during June–October 2018 to determine frequency of HBV genotypes among chronic HBV patients from Baghdad, Iraq. The method of detection was nested polymerase chain reaction system. Further, the study assessed the impact of HBV genotypes on serum level of liver-function tests: total serum bilirubin, alkaline phosphatase, alanine aminotransferase and aspartate aminotransferase. Eighty chronic HBV patients were enrolled in the study. Six HBV genotypes were identified (A, B, C, D, E and F). The most frequently encountered genotypes
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThe History of Multi Parties and its Effect on Political System in India
There are many applied Economic studies that have found positive nexus between financial development and poverty reduction in developing countries. Iraq has witnessed an increasing rate of poverty during the period 1980-2010 due to many internal and external factors such as wars, economic sanctions, inflation, a high rate of unemployment, and political and security instability. Therefore, the investigation about the solutions to reduce poverty becomes very necessary, and enhancing the financial development in Iraq is one of these options. This is due to that the financial development could reduce the poverty rates through two channels: the first is direct via the offering of the loans and other financial facilities to the poor, a
... Show MoreSaudi Arabia’s banking sector plays an important role in the country’s development as it is among the leading sectors in the financial sector. Considering, two main Saudi banks (The National Commercial Bank and Saudi American bank), the present study aims to observe the impact of emotional intelligence on employee performance. The components of emotional intelligence affecting employee performance include self-management, relationship management, self-awareness, and social awareness. A quantitative methodology was applied to analyse the survey results of 300 respondents over the period from 2018 to 2019. The results show that there was a significant positive impact of self-management, self-awareness, and relationship manageme
... Show MoreThis research study of influence of Chinese thought on porcelain in the tang and song period, the study came into four sections, which are:
* First section contains general framework of the research, which include the problem, which is represented by following of questions:
1- Is there intellectual and ideological dimensions in Chinese porcelain?
2-What are the mechanisms and techniques of Chinese porcelain?
.the importance of this research and the need counted as a study providing cognitive addition into the Chinese arts field, especially ceramics of the Chinese. The aim of the research included of areas of artistic creativity in Chinese pottery and ceramics according to the bases of construction and composition. As the impo
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MoreIbn Hajar is one of historian who had a role in historical writing represented by his writings in those active participation in the Arab-Islamic civilization, particularly his approach to intellectual, and pictures of us in his book that's part of the intellectual heritage, but a line that was a key part of the book, any manuscript