Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Arpn Journal Of Engineering And Applied Sciences
PSEUDO RANDOM NUMBER GENERATOR BASED ON NEURO-FUZZY MODELS
...Show More Authors

Producing pseudo-random numbers (PRN) with high performance is one of the important issues that attract many researchers today. This paper suggests pseudo-random number generator models that integrate Hopfield Neural Network (HNN) with fuzzy logic system to improve the randomness of the Hopfield Pseudo-random generator. The fuzzy logic system has been introduced to control the update of HNN parameters. The proposed model is compared with three state-ofthe-art baselines the results analysis using National Institute of Standards and Technology (NIST) statistical test and ENT test shows that the projected model is statistically significant in comparison to the baselines and this demonstrates the competency of neuro-fuzzy based model to produce

... Show More
View Publication
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Electrical And Electronics Engineering
HF Wave Propagation Prediction Based On Passive Oblique Ionosonde
...Show More Authors

High frequency (HF) communications have an important role in long distances wireless communications. This frequency band is more important than VHF and UHF, as HF frequencies can cut longer distance with a single hopping. It has a low operation cost because it offers over-the-horizon communications without repeaters, therefore it can be used as a backup for satellite communications in emergency conditions. One of the main problems in HF communications is the prediction of the propagation direction and the frequency of optimum transmission (FOT) that must be used at a certain time. This paper introduces a new technique based on Oblique Ionosonde Station (OIS) to overcome this problem with a low cost and an easier way. This technique uses the

... Show More
View Publication Preview PDF
Scopus
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Tue Jun 30 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Raised excessive consumption on environment and price levels during the period 2005- 2013.: Raised excessive consumption on environment and price levels during the period 2005- 2013.
...Show More Authors

 

When the financial resources of individuals and groups available, this will lead to increase the consumption ranges and sometimes reached to excessive especially to the categories that have little awareness about economic importance and its reflections. it seems that consumerism has increased in many countries including Iraq because of many factors, and the most important one is the availability of financial resources as a result of the increase in oil exports as well as the spread of consumption media department at various levels especially.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Anais Da Academia Brasileira De Ciências
Molecular characterization of viruses associated to leaf curl disease complex on zucchini squash in Iraq reveals Deng primer set could distinguish between New and Old World Begomoviruses
...Show More Authors

View Publication
Scopus (14)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Mon Nov 19 2018
Journal Name
Arab Science Heritage Journal
دور دور( أبي القاسم قائم مقام )في القضاء على المتنافسين على العرش وتنصيب محمد ميرزا شاهاً على إيران
...Show More Authors

  Abu Al- Qasim Qa ,im Maqam is famous figure in political life of lranian; The life of Abu Al- Qasim Qa ,im Maqam is full of incidents and conflicts in the period of the expansion of foreign influence in lran Abu Al- Qasim Qa ,im Maqam has an important role in the history of Iran Modern political considered him one of the most prominent leaders to the unified Arabian nationalistic liberating Abu Al- Qasim Qa ,im Maqam   raised in the history of the Qajar .

 

 

View Publication Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Studying and Modeling the Effect of Graphite Powder Mixing Electrical Discharge Machining on the Main Process Characteristics
...Show More Authors

Abstract

This paper concerned with study the effect of a graphite micro powder mixed in the kerosene dielectric fluid during powder mixing electric discharge machining (PMEDM) of high carbon high chromium AISI D2 steel. The type of electrode (copper and graphite), the pulse current and the pulse-on time and mixing powder in kerosene dielectric fluid are taken as the process main input parameters. The material removal rate MRR, the tool wear ratio TWR and the work piece surface roughness (SR) are taken as output parameters to measure the process performance. The experiments are planned using response surface methodology (RSM) design procedure. Empirical models are developed for MRR, TWR and SR, using the analysis

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Taking Advantage of the Modulation Method on the Manicans in sitting the Basic Template Iraqi Female Bodies
...Show More Authors

The degree of the woman’s satisfaction on clothing depends, to a large extent, on the body measurements. If clothing is very wide, it shows her enormous and if it is too tight it may draw attention to the defects of the body. It may also lead to the compatibility or incompatibility of clothing with fashion. Whatever the quality of the garment in terms of sewing and design, the costume which is not suitable for body size may affect the physical style negatively and may give the wearer an improper look. Clothing was carried out without measurements and did not use models (templates). The method of preparation affected the overall appearance because it often did not fit the shape of the body completely. Therefore, people thought in many w

... Show More
View Publication Preview PDF