Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Containerized Event-Driven Microservice Architecture
...Show More Authors

Microservice architecture offers many advantages, especially for business applications, due to its flexibility, expandability, and loosely coupled structure for ease of maintenance. However, there are several disadvantages that stem from the features of microservices, such as the fact that microservices are independent in nature can hinder meaningful communication and make data synchronization more challenging. This paper addresses the issues by proposing a containerized microservices in an asynchronous event-driven architecture. This architecture encloses microservices in containers and implements an event manager to keep track of all the events in an event log to reduce errors in the application. Experiment results show a decline in re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2024
Journal Name
العلوم القانونية والسياسية
الحروب والصراعات وتداعيتها على الامن الانساني
...Show More Authors

تعد الحروب و الصراعات واحدة من اقدم الظواىر التي عرفتها المجتمعات البشرية وان ىذه الظاىرة تجسدت في البداية على مستوى الصراعات الفردية عندما كانت ترتقي الى مستوى الاشتباك وكانت بدائية في وسائلها وادواتها ،وكما ان ظاىرة الحرب بدأت من الاسرة ومن ثم القبيلة والعشيرة وانتهت بالدولة ،اذ ان ظاىرة الحروب بشكلها التقليدي تأخذ شكلا تدميريا بعد ان تتطور ابعادىا القصوى وان حدوثها ىو تضارب مصالح واىداف الاطراف وانها ال

... Show More
Preview PDF
Publication Date
Mon Dec 01 2008
Journal Name
Political Sciences Journal
تأثير تكوين الشخصية على السلوك السياسي
...Show More Authors

تأثير تكوين الشخصية على السلوك السياسي

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Apr 15 2023
Journal Name
مجلة جامعة الانبار للعلوم الاقتصادية والادارية
تحليل وقياس العلاقة بين الدين العام وسرعة دوران النقود في الاقتصاد العراقي للمدة من 1990-2019 حسب منهجية ARDL
...Show More Authors

ان دراسة الدين العام في اقتصاد ريعي شديد الارتباط بسوق خارجية شديدة التقلب يعد من الدراسات الحساسة كونها تضع امام الباحثين القيود المالية التي سيتكبل بها اقتصاد ضعيف قليل التنوع يعتمد على سوق الطاقة مما يفقد حالة الاستدامة المالية وتفقد الدولة القدرة على الوفاء بالتزاماتها المالية ، ان الحدود الامنة للدين العام يجب ان تكون بنسبة لا تتجاوز 60% من الناتج المحلي الاجمالي حسب اتفاقية ماسترخت الخاصة بمجلس الاتحا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 11 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Impact of Adolescents' Family Meal Eating Patterns upon their Weight Control Behaviors at Secondary Schools in Baghdad City
...Show More Authors

Objective: The study aimed to identify the adolescents' family meal eating patterns, and find out the relationship between adolescents' family meal eating patterns and their weight control behaviors. Methodology: A descriptive study was conducted on impact of adolescents' family meal eating patterns upon their weight control behaviors in secondary schools at Baghdad city, starting from 20th of April 2013 to the end of October 2014. Non- probability (purposive) sample of 1254 adolescents were chosen from secondary schools of both sides of Al-Karkh and Al-Russafa sectors. Data was collected through a specially

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of The College Of Languages (jcl)
A study of the nomenclature of Russian vocabulary of Arabic origin denoting some religious worship, or denoting some political and social positions: «Лексика арабского происхождения со значением «служители религиозного культа, социального статуса» и её функционирование в русской речи»
...Show More Authors

      The present paper discusses one of the most important Russian linguistic features of Arabic origin Russian lexes denoting some religious worship or some political and social positions like Qadi, Wally, Sultan, Alam, Ruler, Caliph, Amir, Fakih, Mufti, Sharif, Ayatollah, Sheikh.. etc.  A lexical analysis of the two of the most efficient and most used words of Arabic origin Russian lexes that are “Caliph and Sheikh” is considered in the present study. The lexicographic analysis of these words makes it possible to identify controversial issues related to their etymology and semantic development.

The study is conducted by the use of the modern Russian and Arabic dictionary, specifically, (Intermediate lexicon Dictionary

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Electrochemical preparation and characterization of a new configuration SnO2 anode and its application for treating petroleum refinery wastewater
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Chemical Engineering Research And Design
Improvements in hydrogen evolution through a new design of coupling inexpensive nanocomposite electrocatalysts driven by high-voltage electrolysis
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref