The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
During COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThe Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t
... Show MoreIn this paper, a new hybrid algorithm for linear programming model based on Aggregate production planning problems is proposed. The new hybrid algorithm of a simulated annealing (SA) and particle swarm optimization (PSO) algorithms. PSO algorithm employed for a good balance between exploration and exploitation in SA in order to be effective and efficient (speed and quality) for solving linear programming model. Finding results show that the proposed approach is achieving within a reasonable computational time comparing with PSO and SA algorithms.
Game theory problems (GTP) frequently occur in Economy, Business Studies, Sociology, Political Science, Military Activities, and so on are some of the subjects covered. To tackle the uncertainty in Games, the analysis of games in which the payoffs are represented by fuzzy numbers (FN) will benefit from fuzzy set theory (FST).
The purpose of this paper is to develop an efficient technique for solving constraint matrix games (MG) with payoff trapezoidal fuzzy numbers (TFN). The description of the new ranking method is introduced for a constrained matrix with TFN and values. Stock market forecasting has been one of the most important research areas for decades. Stock market values are volatile, non-linear, complicated and ch
... Show MoreThe research aimed to study the job satisfaction of the staff of the Federal board of supreme Audit and its relation to the effectiveness of their performance, The questionnaire was adopted as a main tool in the collection of data and information from a random sample of (54) employees of the Federal board of supreme Audit. In light of this, the data were collected and analyzed and the hypotheses were tested using the statistical program (SPSS).
The researchers reached a number of conclusions, the most important of which were: (1) the respondents' response to the variables of job satisfaction and the effectiveness of the performance were medium; (2) there was a significant relationship between job satisfaction and performance effe
... Show MoreThis study was based on the determination of aphid species that infested Chrysanthemum sp. (Asterales, Asteraceae) in the middle of Iraq; five aphid species belong to subfamily Aphidinae were recorded: Aphis fabae Scopoli, 1763, Aphis gossypii Glover, 1877, Coloradoa rufomaculata (Wilson, 1908), Macrosiphoniella sanborni (Gillette, 1908) and Myzus persicae (Sulzer, 1776). A. gossypii was the most dominant species throughout the study period while M. persicae is the lesser species.
A summary of the main taxonomic characters is presented here and a pictorial key which was designed to separate aphi
... Show MoreThis research shows the issues of Ibn Hisham's illusion in its leadership of the grammarians; As Ibn Hisham attributed - during his presentation of grammatical issues - grammatical opinions to a number of grammarians claiming them in them, and after referring to the main concepts that pertain to those grammarians, we found that Ibn Hisham had delusional in those allegations, in addition to that clarifying the terms illusion and claim in the two circles of language And the terminology, and perhaps the most prominent result in this research is that he worked to investigate these issues by referring to their original sources, with an explanation of the illusions of Ibn Hisham in his attribution to these issues.
The paper deals with claims in construction projects in Iraq and studies their types, causes, impacts, resolution methods and then proposes a management system to control the impacts of claims. Two parts have been done to achieve the research objective (theoretical part and practical part). The findings showed that the main types of the claims are extra work claims, different site condition claims, delay claims and the main causes of the claims are variation of the orders, design errors and omission, delay in payments by owner, variation in quantities and scheduling errors. The claims have bad impacts on the cost by increasing (10% to 25%) and also on the duration of the project by increasing from (25% to 50%).The negotiation is the main
... Show MoreAbstract Twelve isolates of bacteria were obtained from samples of different soils and water amended with 100µg/ml of five heavy metals chlorides (i.e: Aluminum Al+2, Iron Fe+2, Lead Pb+2, Mercury Hg+2 and Zinc Zn+2). Four isolates were identified as Bacillus subtilis and B. subtilis (B2) isolate was selected for this study according to their resistance to all five heavy metals chlorides. The ability of B. subtilis (B2) isolate for growing in different concentration of heavy metals chlorides ranging from 200-1200 µg/ml was tested. The highest conc. that B. subtilis (B2) isolate tolerate was 1000 µg/ml for Al+2, Fe+2, Pb+2, and Zn+2and 300 µg/ml for Hg+2 for 24hour. The effect of heavy metals chlorides on bacterial growth for 72 hrs was
... Show More