The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
In this article, the research presents a general overview of deep learning-based AVSS (audio-visual source separation) systems. AVSS has achieved exceptional results in a number of areas, including decreasing noise levels, boosting speech recognition, and improving audio quality. The advantages and disadvantages of each deep learning model are discussed throughout the research as it reviews various current experiments on AVSS. The TCD TIMIT dataset (which contains top-notch audio and video recordings created especially for speech recognition tasks) and the Voxceleb dataset (a sizable collection of brief audio-visual clips with human speech) are just a couple of the useful datasets summarized in the paper that can be used to test A
... Show MoreThe increasing use of antiseptic compounds creates selective pressure cause emergence of antiseptic resistance among Staphylococcus aureus .Resistance mechanism of antiseptic is driven mainly by multi drug resistant (MDR) efflux protein.Sixty five isolates of S.aureuswere collected from different clinical sources and subjected to 11 antibiotics most of them are recognized by efflux systems as extruded substrates. Range of efflux activity was estimated using cartwheel method. Simultaneous discrimination of antiseptic coding genes (qacA/B, smr and norA)as well as nuc and mecA genes among multidrug resistantS.aureus(MRSA) isolates was preformed using multiplex PCR assay
... Show MoreThis study aimed to identify and describe one of the bacterial feeder nematode Acrobeloides varius Kim, Kim and Park, 2017 (Rhabditida, Cephalobidae), which was isolated from soil samples that were collected from Baghdad, central of Iraq, and was classified using both morphological and molecular criteria. All specimens of A. varius were cultured, identified and described using morphometric criteria. Selected specimens (Zah. IRQ3 OR994579.1 isolate) of this species were characterized by having the body length of the male ranging from (184.94 – 221.72 μm), the body length of the female ranging (507.38 – 521.92 μm) and the body length of the juvenile ranging from (355.53 – 490.35 μm). Selected specimens of this species were m
... Show MoreA specific, sensitive and new simple method was used for the determination of methyldopa in pure and pharmaceutical formulations by using continuous flow injection analysis. This method is based on formation of ion pair compound between methyldopa and potassium hexacyanoferrate in acidic medium to obtain a yellow precipitate complex using long distance chasing photometer (NAG-ADF-300-2). The linear range for calibration graph was 0.05-35 mmol/L for cell A and 0.05-25 mmol/L for cell B, and LOD 1.4292 µg /200 µL for both cells with correlation coefficient (r) 0.9981 for cell A and 0.9994 for cell B, RSD% was lower than 0.5 % for n=8 for. The results were compared with classical method UV-Spectrophotometric at λ max=280 nm and turbi
... Show MoreHerein, we report designing a new Δ (delta‐shaped) proton sponge base of 4,12‐dihydrogen‐4,8,12‐triazatriangulene (compound
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper
Currently, there is no established of e-waste treatment in Thi- Qar province, while their creating is increasing every year. It has been well- known that e-waste is a source of environmental degrading and their placement in landfills increases the irreversible climate change. A research model has been developed to link three components: coercive pressure, normative influence, and mimicry, then study their effect on e-waste adopt and continuance intentions. The model was validated using data collected from a field survey of 92 managers of small enterprises in Thi-Qar province. A questionnaire was developed to collect data. It contains five major variables, exemplify by fourteen items. Als
... Show MoreThe issue of Palestinian prisoners inside the prisons of the Israeli occupation is considered
a humanitarian issue par excellence، as it affects every Palestinian family as a
result of the absence of a husband، wife or son.
Almost no Palestinian house is vacant without one or more prisoners، and even women،
children and the elderly are not spared from these arrests.
The problem of the study was to identify the role of public relations in the Ministry
of Detainees and Ex-Prisoners Affairs in educating the Palestinian public about the
issue of prisoners، the nature of this role and the means used to bring support and
solidarity with this important and sensitive issue through the applied study on the
employee