The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Breast cancer has got much attention in the recent years as it is a one of the complex diseases that can threaten people lives. It can be determined from the levels of secreted proteins in the blood. In this project, we developed a method of finding a threshold to classify the probability of being affected by it in a population based on the levels of the related proteins in relatively small case-control samples. We applied our method to simulated and real data. The results showed that the method we used was accurate in estimating the probability of being diseased in both simulation and real data. Moreover, we were able to calculate the sensitivity and specificity under the null hypothesis of our research question of being diseased o
... Show MoreThis study was conducted at the poultry research station to the office of Agricultural Research / Ministry of Agriculture / during the period 4/1/2016 to 5/5/2016 and 336 one-day-old Ross308 chicks were used, and fed on diets provided with dried dill (Anethum gravelens) at levels 0.4, 0.6 and 0.8% for treatments D2, D3 and D4, respectively, and they were compared with the control treatment D1. Each treatment included three replicates in each replicate contain 28 birds, in order to study the effect of adding different levels of dried dill plant on the productive performance and some characteristics of the carcass for broilers. The results showed a significant increase (p<0.05) in the average body weight at 5 weeks of age for the treatments (
... Show MoreThis study was carried out at Poultry Research Station, State Board of Agricultural Research, Ministry of Agriculture for the period from 27 September 2014 to 9 November 2014 to evaluate the Supplementation of different levels of Conjugated Linoleic Acid (CLA) on productive performance of broiler. Four hundred eighty chicks (Ross-308),one day old were randomly distributed to four dietary treatments for 42 days of age with 3 replicates/vtreatment (40 bird/replicate). Experimental treatments were as follow; T1 (Control diet) without supplement, while the treatment T2,T3 and T4 were Supplemented with 1, 1.5, 2 g CLA /kg diet respectively. The results showed significant (P ≤ 0.05) increased in mean of body weight, weight gain, ave
... Show MoreBackground: This study was formulated to compare the effect of 5%hydrofluoric acid in comparison to 37%phosphoric acid with and without the application of silane on bond strength of composite to porcelain. Materials and Methods: Specimen preparation was divided in to two phases, metal-disks fabrication (8mm-diameter and 4mm-thickness) and ceramic veneering. Thirty two specimens were prepared, sandblasted with 50 μm aluminum oxide, and divided into four groups of eight samples. Groups I and III were etched with 37%phosphoric acid while groups II and IV were etched with 5%hydrofluoric acid; and groups I and II were silaneted while groups III and IV were not. Heliobond, and resin composite were applied to each specimen using a plastic transpa
... Show More
Metaphor is a linguistic phenomenon related to people's cultures. It is an integral part of cultural heritage. This paper tackles the use of animal-based metaphors in the field of football club titles so as to draw comparisons between those in Russian with their counterparts in Arabic. Names of animals are used to refer to some clubs and teams, where these names or titles reflect animal features such as strength, preying on victims; or animal figures are employed in the club symbols, or due to the similarity of the club shirt to the animal outer shapes in colours. For instance, "an-Nawaris", which means gulls in English, is used to refer to az-Zawraa club du
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show MoreLet be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.
The image caption is the process of adding an explicit, coherent description to the contents of the image. This is done by using the latest deep learning techniques, which include computer vision and natural language processing, to understand the contents of the image and give it an appropriate caption. Multiple datasets suitable for many applications have been proposed. The biggest challenge for researchers with natural language processing is that the datasets are incompatible with all languages. The researchers worked on translating the most famous English data sets with Google Translate to understand the content of the images in their mother tongue. In this paper, the proposed review aims to enhance the understanding o
... Show More