The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Objective(s): To measure the level of job satisfaction and job performance of nurses and to find out
the association between participants' socio-demographic characteristic of nurse and their job
satisfaction and job performance.
Methodology: A descriptive analytic study design was carried out to measure the nurses' level of job
satisfaction and job performance in Al-Suwaira general hospital and to find out the association between
nurses and their socio-demographic characteristic. The study was started from March 5th, 2017 to
September 31th, 2017. The sample was Non - probability (purposive) sample of (100) nurses were
selected according to the study that are actual working in nursing department in Al-Suwaira General<
In this research the natural frequency of a cracked simple supported beam (the crack is in many places and in different depths) is investigated analytically, experimentally and numerically by ANSYS program, and the results are compared. The beam is made of iron with dimensions of L*W*H= (0.84*0.02* 0.02m), and density = 7680kg/m3, E=200Gpa. A comparison made between analytical results from ANSYS with experimental results, where the biggest error percentage is about (7.2 %) in crack position (42 cm) and (6 mm) depth. Between Rayleigh method with experimental results the biggest error percentage is about (6.4 %) for the same crack position and depth. From the error percentages it could be concluded that the Rayleigh method gives
... Show MoreThe research aims to delve into the nature of international financial reporting standards and the unified accounting system adopted in the Iraqi environment and financial ratios in the theoretical side. In the practical aspect, the results of some financial ratios of Basrah Gas Company were compared with the adoption of the financial statements prepared on the basis of the consolidated accounting system with the prepared financial statements Based on the International Financial Reporting Standards (IFRS). The research has reached a number of conclusions, including a difference in the accounting rules and practices between IFRS and the consolidated accounting system in force in Iraq. The adoption of IFRS has led to a decrease in profitabi
... Show MoreThe lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreDetection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86
... Show MoreIn this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreSkull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither non-brain tissues nor
... Show MoreSecure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre
... Show More