Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Iraqi stock market structure analysis based on minimum spanning tree
...Show More Authors

tock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.

View Publication
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Application Or Innovation In Engineering & Management
Far Infrared Photoconductive Detector Based on Multi-Wall Carbon Nanotubes
...Show More Authors

Far infrared photoconductive detectors based on multi-wall carbon nanotubes (MWCNTs) were fabricated and their characteristics were tested. MWCNTs films deposited on porous silicon (PSi) nanosurface by dip and drop coating techniques. Two types of deposited methods were used; dip coating sand drop –by-drop methods. As well as two types of detector were fabricated one with aluminum mask and the other without, and their figures of merits were studied. The detectors were illuminated by 2.2 and 2.5 Watt from CO2 of 10.6 􀀀m and tested. The surface morphology for the films is studied using AFM and SEM micrographs. The films show homogeneous distributed for CNTs on the PSi layer. The root mean square (r.m.s.) of the films surface roughness in

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Phenomena (submission delays) and (deletion) and Dalalthma on the social meanings in part (28) of the Holy Quran
...Show More Authors

Arabic language , like any other living languages grow and evolve ; social phenomenon
it is subject to the law of life ; therefore resemble organism also touted as the most eloquent
language and the ability to meet the needs of people in every time and place.
The contemplation of the verses of the Koran reveals a lot of means of expression
leading to the grammatical meaning of the social.
I have tried in this research that investigated the social meanings through the phenomena
of deletion and delivery delays and capture semantic landing through the meanings that lead
to psychological persuasion to comply with the orders after the rights of the divine in which
social directives.
It remains the greatest mystery o

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Financing and its impact on municipal performance in the municipalities of Missan governorate for the period (2011-2018)
...Show More Authors

The research aims to show the role or extent of the impact of financing in its various forms on the municipal performance before and after the financial deficit through relying on the analytical research methodology of the research community represented by the Directorate General of Municipalities and the Directorate of Maysan municipalities as a sample of research (13) municipal institutions for a period of (8) years, Considering the completion of the final accounts of these years, which provides the necessary data for the study, in addition to the variation in the quality and amounts of grants allocated to municipal institutions during these years, which gives a clearer and more comprehensive picture of the reality of allocatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Preventive measures for banking supervision on money laundering (Search in the Gulf Commercial Bank)
...Show More Authors

The research aims to study and assess the effectiveness of preventive measures banking for the reduction of money laundering based on the checklist (Check list), which have been prepared based on the paragraphs of some of the principles and recommendations of international and Money Laundering Act No. 93 of 2004 and the instructions thereto, to examine and assess the application of these measures by Gulf Commercial Bank, which was chosen to perform the search.

I've been a statement the concept of money laundering in terms of the definition and characteristics, stages and effects of political, economic and social as well as the nature of banking supervision in terms of the definition and the most important

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of the Adoption of IFRS 17 “Insurance Contracts” on the Procedures for Auditing Insurance Contracts in the Iraqi Environment
...Show More Authors

          IFRS 17 aims to provide a unified basis for accounting for all types of insurance contracts, including reinsurance contracts, in a manner that benefits both investors and insurance companies and enhances the ability of the financial statements of insurance companies for comparison between companies listed in financial markets around the world. According to this standard, insurance contracts are accounted for on the basis of the Asset-Liability Approach and the use of fair values that the standard requires updating regularly in order to provide more useful information to the users of financial statements, as a result of the failure of reporting requirements for insurance contr

... Show More
View Publication Preview PDF
Crossref