The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The study aimed to explore the effectiveness of using rational judgment strategy in teaching science to develop scientific thinking for second-grade students. The researcher utilized the quasi-experimental approach based on (the pre/post designing) of two groups: experimental and control. As for tools: a test of scientific thinking prepared by the researcher that proved its verification of their validity and reliability. The test applied on a random sample of (66) students, divided into two groups: (34) experimental, and (32) control. The results showed that the experimental group outperformed the control group in the post-application of the scientific thinking test, In each skill separately, and in the total skills. The study recommende
... Show MoreATAW Eqbal Abdul Ameer'. Shifaa Jameel Ibrahim?, HISTORY Of MEDICINE, 2023
Abstract: Iatrogenic furcal root perforations are serious complications during dental treatment. This study was aimed to compare the sealing ability of new bioceramic root repair material TotalFill® with the other perforation repair materials (GIC, MTA and Biodentine) using a dye- extraction method.Materials and Methods: Forty extracted, human mandibular molars with non-fused well developed root were collected. Artificial perforations were made from the external surface of the teeth. Then the teeth were randomly divided into 4 experimental groups (n= 10) according to the type of repair material used in this study; Medifil glass ionomercement, TotalFill® bioceramic root repair material, BiodentineTM and MTA Plus. The specimens were then im
... Show MoreObjectives To tailor composites of polyethylene–hydroxyapatite to function as a new intracanal post for the restoration of endodontically treated teeth (ETT). Methods Silanated hydroxyapatite (HA) and zirconium dioxide (ZrO2) filled low-density polyethylene (LDPE) composites were fabricated by a melt extrusion process and characterised using infrared spectroscopy (FTIR), differential scanning calorimetry (DSC) and dynamic mechanical analysis (DMA). The flexural strength and modulus were determined in dry state and post ageing in simulated body fluid and fractured surfaces analysed by SEM. The water uptake and radiographic appearance of the experimental composites were also measured and compared with a commercially known endodontic fibre
... Show MoreA multistep synthesis was established for the preparation of a new vanillic acid-1, 2, 4-1triazole-3-thiol conjugate (
Abstract
Objective(s): To evaluate the level of Psychological Empowerment among Nurses as perceived by their Point of View, and identify the differences in nurses' Psychological Empowerment with regard to age, gender, graduation level, and years of work employment.
Methodology: A descriptive analytic design was conducted on nurses in Psycho-social health Units in Primary Health Care Centers in Kirkuk Governorate, to achieve the objectives of the study. A convenient (non-probability) sample of 84 nurses was selected. The data collected through self-report method for the period from 25th August to 10th October 2022. The questionnaire was adopted
... Show MoreA novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreSome auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones. The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent
... Show More