The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
This study focused on the synthesis of novel polymers incorporating the 1,3,4-oxadiazole ring. Four polymers were specifically prepared by blending polymers (6-9) with polyvinyl alcohol (PVA) in defined ratios, resulting in the formation of blended polymers (10-13). The synthesized polymers were characterized using Fourier Transform Infrared (FTIR) spectroscopy and proton nuclear magnetic resonance (1H-NMR). The results showed that the structure aligned with the proposed synthetic polymers. Furthermore, the physical and thermal properties were studied using scanning electron microscopy (SEM), thermogravimetric analysis (TGA) and Differential Scanning Calorimetry (DSC). Additionally, the biological activity was examined against two s
... Show MoreThis study focused on the synthesis of novel polymers incorporating the 1,3,4-oxadiazole ring. Four polymers were specifically prepared by blending polymers (6-9) with polyvinyl alcohol (PVA) in defined ratios, resulting in the formation of blended polymers (10-13). The synthesized polymers were characterized using Fourier Transform Infrared (FTIR) spectroscopy and proton nuclear magnetic resonance (1H-NMR). The results showed that the structure aligned with the proposed synthetic polymers. Furthermore, the physical and thermal properties were studied using scanning electron microscopy (SEM), thermogravimetric analysis (TGA) and Differential Scanning Calorimetry (DSC). Additionally, the biological activity was examined against two s
... Show MoreTotal Quality Assurance Concept have appeared in Higher Education Institutions as a result of the continuous criticism for the lower quality of the outputs of these institutions and their inappropriacy to the needs of the job market. The faculty, i.e. teaching staff member, is one of the most important output for his/her responsibility to achieve the stated goals in higher education. This represents a problem that may influence the construction of society which has to limit his tasks, responsibilities, and competencies that should be found in a faculty, and evaluating his teaching profession in light of the prerequisites of the century to become an input to achieve quality assurance in Higher Education. Therefore, the present study aims
... Show MoreTechnology developed at very rapid paces in the last decade of the twentieth century and what followed, especially communication technology, as the World Wide Web appeared in the mid-nineties of the last century, Facebook in 2004 and 2006, the mobile phone, 1993, 1994, and social networking sites. The other. These technological developments have had an impact on societies, whether among individuals in one country or among different peoples. The citizen in any part of the world has become a journalist who practices the work of a specialized or professional journalist, even if he does not know how to read and write, or has a low level of education, as he can now transmit events from wherever he is to the world, through his personal page, or v
... Show MoreAchieving reliable operation under the influence of deep-submicrometer noise sources including crosstalk noise at low voltage operation is a major challenge for network on chip links. In this paper, we propose a coding scheme that simultaneously addresses crosstalk effects on signal delay and detects up to seven random errors through wire duplication and simple parity checks calculated over the rows and columns of the two-dimensional data. This high error detection capability enables the reduction of operating voltage on the wire leading to energy saving. The results show that the proposed scheme reduces the energy consumption up to 53% as compared to other schemes at iso-reliability performance despite the increase in the overhead number o
... Show MoreObjectives: to evaluate patient knowledge with hemodialysis and to determine the effectiveness of Self-regulation Fluid Program on Patients with hemodialysis self-efficacy for fluid adherence in Al-Diwaniyah Teaching Hospital.
Methodology: A quasi-experimental design (two group design: pre-test and post-test) was used. This study was conducted in Al-Diwaniya Teaching Hospital for the period from (15th of October 2018 to 20th of May 2019) on a non-probability (purposive) sample consisting of (60 patients) treatment in hemodialysis units. A questionnaire was built as a data collection tool and consisted of four parts:
First part: Demographic characteristics of the pati
... Show MoreOptimization is essentially the art, science and mathematics of choosing the best among a given set of finite or infinite alternatives. Though currently optimization is an interdisciplinary subject cutting through the boundaries of mathematics, economics, engineering, natural sciences, and many other fields of human Endeavour it had its root in antiquity. In modern day language the problem mathematically is as follows - Among all closed curves of a given length find the one that closes maximum area. This is called the Isoperimetric problem. This problem is now mentioned in a regular fashion in any course in the Calculus of Variations. However, most problems of antiquity came from geometry and since there were no general methods to solve suc
... Show MoreThe research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such
The Evolution Of Information Technology And The Use Of Computer Systems Led To Increase Attention To The Use Of Modern Techniques In The Auditing Process , As It Will Overcome Some Of The Human Shortcomings In The Exercise Of Professional Judgment, Then It Can Improve The Efficiency And Effectiveness Of The Audit Process, Where The New Audit Methodologies Espouse The Concept Of Risk Which Includes Strategic Dimension With Regard To The Capacity Of The Entity To Achieve Its Goals, Which Requires Auditors To Rely On Advanced Technology That Can Identify The Factors Which Prevent The Entity From Achieving Its Objectives. The Idea Of Research Is To Preparing An Electronic Program Fer All Audit Work From Planning Through Sampling And Document
... Show More