The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected powe
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreA new series of Sulfamethoxazole derivatives was prepared and examined for antifibrinolytic and antimicrobial activities. Sulfamethoxazole derivatives bear heterocyclic moieties such as 1,3,4-thiadiazine {3}, pyrazolidine-3,5-diol {4} 6-hydroxy-1,3,4-thiadiazinane-2-thione {5} and [(3-methyl-5-oxo-4,5-dihydro-1H-pyrazol-4-yl)diazenyl] {8}. Their structures were elucidated by spectral methods (FT-IR, H1-NMR). Physical properties are also determined for all compound derivatives. Recently prepared compounds were tested for their antimicrobial activity in the laboratory. Each screened compound showed good tendency to moderate antimicrobial activity.
Alms (or Zakat) is one of the Pillar of Islam and it was atask imposed on
Muslims. Becomes of the importance of this task and its influence on the human
Psychic in particular and on the Society in general this study aims at Studying the
words that it refers to in the Holy Quran, At the beginning the researcher has
introduced the words it refers to, and the significance of each in the Holy Quran and
the Speciality of each one of such words, then the Structures they donet have been
also introduced, whether such structures are descriptive, adverbial or verbal.This was
introduced in addition to explaining the influence of changing the Shape of such
words in emphasizing the meaning and the influence of Portraiting styl
Research revealed the most important things:
1 - that the sentence if the nominal manufacturing according to one of the main frames for the construction of the original sentence or the nucleus called the obstetric and called the nominal or actual.
2 - is not an element of denial. Some of them counted in the Acts the people of Basra are missing and some of them are counted conjunction Menem people of Kufa and promise of the tools of the exception and some of them promise to benefit neglected exile is not Flaaml have at this team.
- What precluding it have a characteristic which they enter the actual sentence and never let an impact on the act, and the intervention of the nominal sentence Fathol
Numerical and linguistic methods were varied in interpretation unless they were in accordance with the grammar
Texts of speech, and this was one of the methods used by linguists and linguists as well
What they call them (the opposite is the opposite), and this is what the word "pregnancy"
Is a synonym for the term "interpretation." This term was often used for syntax
The physical and linguistic cause when an act exceeds the character in which it is known to be infringed, or when
The use of a tool with a little use of it, especially by scientists who knew about it
Pay attention to grammatical errors. The Arabs may have uttered the word and wanted to denounce it
He went even further when the eraser carried away his abr
نتيجة للتطور و انفتاح الاسواق الاقتصادية عالميا ظهرت اهمية الافصاح في القوائم المالية و اعدادهايكونمبني على ( العدالة و الشفافية ) في اظهار البنود الواردة فيها ، و لان هذه القوائم تعد لا كثر من جهة مستفيدة ( اصحاب المصلحة ) سواء كانوا مستثمرين او مقرضين او هيئات حكومية حيث يجب اعدادها بطريقة اكثر شفافية و بدون تحيز لجهة دون اخرى ،هدفت الدراسة الى التعرف على اهم الفروقات الضريبية المؤجلة التي تنشأ في الوحدات الا
... Show More