Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 23 2011
Journal Name
International Journal Of The Physical Sciences
Fast prediction of power transfer stability index based on radial basis function neural network
...Show More Authors

View Publication
Scopus (16)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 27 2025
Journal Name
Al–bahith Al–a'alami
New Methods and Old Issues: Theoretical and Methodological Approaches to Social Network Sites in the Arab Region
...Show More Authors

This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Ara

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Development of Japanese Military Abitity and its Reflection on the New Japanese Role
...Show More Authors

خلاصة (استطاعت اليابان بعد الحرب العالمية الثانية ان تنهض من جديد، وان تحقق تجربة تحديث سياسي جعلها تشهد تبدلات جذرية من الفقر الى الغنى ومن سيطرة الحكم العسكري الى الدولة المنزوعة السلاح ومن التخلف الى التكنولوجيا الاكثر تطورا في العالم, ومن الانغلاق والعزلة وذهنية سكان الجزر الى الانفتاح على ثقافات عصر العولمة ووسائل اعلامها. فكيف يمكن الاستفادة من هذه التجربة الحديثة سياسيا بل وحتى اقت

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 31 2022
Journal Name
مجلة كلية الإدارة و الاقتصاد للدراسات الاقتصادية و الإدارية و المالية
دور مؤشر السيولة المصرفية في الرقابة الإشرافية للبنك المركزي العراقي على المصارف المتخصصة
...Show More Authors

عد الرقابة الإشرافية احد اهم الأدوات التي تستخدمها البنوك المركزية في تقييم التزام المصارف بالمتطلبات التنظيمية والقوانين الصادرة منها وتستخدم البنوك المركزية عدة مؤشرات مالية منها مؤشر السيولة المصرفية لتقييم أداء المصارف تجاه حماية أموال المودعين وحماية المصارف من خطر نقص السيولة ومن ثم التعرض للإفلاس، لذا اقتضت الضرورة إلى دراسة مؤشر السيولة المصرفية الذي يستخدم كأحد أدوات الرقابة الإشرافية من قبل ال

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Exponential Function of a bounded Linear Operator on a Hilbert Space.
...Show More Authors

In this paper, we introduce an exponential of an operator defined on a Hilbert space H, and we study its properties and find some of properties of T inherited to exponential operator, so we study the spectrum of exponential operator e^T according to the operator T.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 27 2025
Journal Name
Journal Of Economics And Administrative Sciences
The effect of creating knowledge according to the model (Nonaka & Takeuchi, 1995) on organizational ambidexterity: A study on a sample of Iraqi private banks
...Show More Authors

Purpose - This study relies on the descriptive and analytical approach through collecting and analyzing the necessary data, as this approach focuses on polling the opinions of the research sample and its directions, and aims to develop a model that studies the relationship between knowledge creation and organizational ambidexterity in Iraqi private banks and verifying its validity experimentally. Design / Methodology / Introduction - A survey was conducted through a questionnaire form to collect data from a sample of (113) managers in private commercial banks. In addition, this study used the AMOS program and the ready-to-use statistical program package (SPSS V.25) to test the proposed hypotheses of the theoretical model experimentally. Res

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 15 2024
Journal Name
Journal Of Baghdad College Of Dentistry
A clinicopathological analysis of 151 odontogenic tumors based on new WHO classification 2022: A retrospective cross-sectional study
...Show More Authors

Background: Odontogenic tumors are a diverse group of lesions with a variety of clinical behavior and histopathologic subtypes, from hamartomatous and benign to malignant. The study aimed to examine the clinical and pathological features of odontogenic tumors in Baghdad over the last 11 years (2011–2021). Materials and Methods: The present retrospective study analyzed all formalin-fixed, paraffin-embedded tissue blocks of patients diagnosed with an odontogenic tumor that were retrieved from archives at a teaching hospital/College of Dentistry in Baghdad University, Iraq, between 2011 and 2021. The diagnosis of each case was confirmed by examining the hematoxylin and eosin stained sections by two expert pathologists. Data from pati

... Show More
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for Children with Autism and their Mothers Based on the Picture Exchange Commination System to Confront Some of Basic Disorders for these Children
...Show More Authors

Abstract

The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Al-academy
color methodology to Re-reading the musical notes
...Show More Authors

many painters tried to mix colors with Music by direct employment through colorful musical pieces or the use of multiple instruments and techniques , or vice versa, including the French artist )Robert Stroben(, he transferred the piece of music to be depicted on the painting and worked on the tones of music (Johann Sebastian Bach) by dropping the color on the lines of the musical scale, for example (the C tone) ranging from brown to red ( Tone La A) from gray to orange, and so on, the presence of links and similarity factors between the world of music and the world of colors facilitated the process of linking musical notes with colors, the most famous of which was presented by the world (Newton) in the circle of basic colors and linking

... Show More
View Publication Preview PDF
Crossref