The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
The research aims to shed light on the nature of the tax gap in the income tax by the method of direct deduction and its reflection on the financial objective of the tax, and to determine the reasons for this gap in the deduction between the tax due in accordance with the laws and instructions in force and the tax actually paid. The tax gap is a real problem that cannot be ignored for what it represents loss of financial revenues due to the state.
The research problem is represented in the existence of a gap between the tax due according to direct deduction instructions and the tax actually paid according to the financial statements, and to achieve the objectives of the research and test the hypotheses, t
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreDrones play a vital role in the fundamental aspects of Industry 4.0 by converting conventional warehouses into intelligent ones, particularly in the realm of barcode scanning. Various potential issues frequently arise during barcode scanning by drones, specifically when the drone camera has difficulty obtaining distinct images due to certain factors, such as distance, capturing the image whilst flying, noise in the environment and different barcode dimensions. In addressing these challenges, this study proposes an approach that combines a proportional–integral–derivative (PID) controller with image processing techniques. The PID controller is responsible for continuously monitoring the camera’s input, detecting the difference
... Show MoreWireless Multimedia Sensor Networks (WMSNs) are a type of sensor network that contains sensor nodes equipped with cameras, microphones; therefore the WMSNS are able to produce multimedia data such as video and audio streams, still images, and scalar data from the surrounding environment. Most multimedia applications typically produce huge volumes of data, this leads to congestion. To address this challenge, This paper proposes Modify Spike Neural Network control for Traffic Load Parameter with Exponential Weight of Priority Based Rate Control algorithm (MSNTLP with EWBPRC). The Modify Spike Neural Network controller (MSNC) can calculate the appropriate traffi
... Show MoreSince the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreA research include of synthesized five member ring, which has been synthesized by condensation of 2-(1-(4- hydroxyphenyl) ethylidene)hydrazine-1-carbothioamide[I] with α-chloro ethylacetate in sodium acetate (fused) to form ethyl 2-(4-(1-((4-oxo-2-thioxopyrrolidin-3-ylidene)hydrazono) ethyl)phenoxy)acetate [II]. After that reacted [II]with hydrazine hydrate to resulting compound [III]. Compound [III] was refluxed with 4-aminobenzoicacid in excess of phosphorus oxy chloride give compound [IV],the later compound [IV] interact with acetyl acetone or ethylacetoacetate give to pyrazole and pyrazoline derivatives[V],[VI]. While when reacted with different aromatic aldehydes and one ketone consistence Schiff base derivatives [VII]a-e . The FTIR a
... Show MoreG. tuberculosa is a newly recorded species from the Caryophyllaceae family for Iraqi flora, collected from the Arbil district from May to August. Morphological descriptions with macro and micro features illustrated with plates and dimensions, the species is related to G. pallida and distinguished from calyx properties, especially the presence of large prominent druses crystals. Keywords: Caryophyllaceae, Gypsophila, Iraq, New record, pallida.
This work contain many steps starting from esterification of isophthalic acid to yield diester compound [I] which was converted to their acid hydrazide [II], then the later compound reacted with ethylacetoacetate to yield pyrazol-5-one compound [III]. Afterword added acetyl chloride to give the compound [IV], thereaction of this compound with theiosemicarbazide ledto produce a new carbothioamide compound [V], Which was reacted with ethyl chloro acetate to yield thethioxoimidazolidin compound [VI]. The condensation reaction of this compound with different substituted aldehyde give new alkene derivatives[VII]a-d. The synthesized compounds were characterized by melting points , FT-IR ,1H-NMR and Mass spectroscopy .
Novel heterocyclic polyimide 5(a,b) have been synthesized based on polyacrylic backbone. The synthetic route start with nucleophilic substitution of 2-amino, or 4-amino, pyridine 1(a,b) to the polyacryloyl chloride afforded poly substituted amide 2(a,b). Another nucleophilic substitution were carried with adipoyl chloride to form polyimide chloride 3(a,b). Treatment of 3(a,b) with hydrazine hydrate afforded acid hydrazide polyimide 4(a,b), which upon cyclocondensation with carbon disulfide gave the target heterocyclic polyimide. The synthesized compounds were identified by spectroscopic methods: FT-IR, 1H-NMR and 13C-NMR.