The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
This study aims at suggesting flow as a strategy for training female EFL student-teachers in the teaching training course and finding out the effect of this strategy on their performance and their flow state. The training course syllabuses will be constructed according to the flow nine factors and the teaching skills. The measurement tools are the student-teacher performance checklist that has already been used by the department of English language and SHORT Flow State Scale (S FSS-2). The study population is represented with the (60) female student-teachers/ fourth stage/ evening studies at theEnglish department /college of education for women/the University of Baghdad. The study is used the experimental design in that (30) of the student-
... Show MoreA comparison between the resistance capacity of a single pile excited by two opposite rotary machines embedded in dry and saturated sandy soil was considered experimentally. A small-scale physical model was manufactured to accomplish the experimental work in the laboratory. The physical model consists of: two small motors supplied with eccentric mass 0·012 kg and eccentric distance 20 mm representing the two opposite rotary machines, an aluminum shaft with 20 mm in diameter as the pile, and a steel plate with dimensions of (160 × 160 × 20 mm) as a pile cap. The experimental work was achieved taking the following parameters into consideration, pile embedment depth ratio (L/d; length to diameter) and operating freq
... Show MoreEssential approaches involving photons are among the most common uses of parallel optical computation due to their recent invention, ease of production, and low cost. As a result, most researchers have concentrated their efforts on it. The Basic Arithmetic Unit BAU is built using a three-step approach that uses optical gates with three states to configure the circuitry for addition, subtraction, and multiplication. This is a new optical computing method based on the usage of a radix of (2): a binary number with a signed-digit (BSD) system that includes the numbers -1, 0, and 1. Light with horizontal polarization (LHP) (↔), light with no intensity (LNI) (⥀), and light with vertical polarization (LVP) (↨) is represen
... Show MoreIn this research, the electrical characteristics of glow discharge plasma were studied. Glow discharge plasma generated in a home-made DC magnetron sputtering system, and a DC-power supply of high voltage as input to the discharge electrodes were both utilized. The distance between two electrodes is 4cm. The gas used to produce plasma is argon gas which flows inside the chamber at a rate of 40 sccm. The influence of work function for different target materials (gold, copper, and silver), - 5cm in diameter and around 1mm thickness - different working pressures, and different applied voltages on electrical characteristics (discharge current, discharge potential, and Paschen’s curve) were studied. The results showed that the discharge cur
... Show MoreThe present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil
... Show MoreIntroduction: Diabetic foot infections are one of the most severe complications of diabetes. This study was aimed to determine the common bacterial isolates of diabetic foot infections and the in vitro antibiotic susceptibility then treatment.
Methods: A swab was taken from the foot ulcer, and the aerobic bacteria were isolated and identified by cultural, microscopic and biochemical test, then by api-20E system. After that their antibiotic susceptibility pattern was determined. Then local and systemic treatment was used to treat the diabetic foot patients.
Results: Bacterial isolates belonging to twelve species were obtained from diabetic foot patients. Gram (-) bacteria were the predominant pathogens in the diabetic foot infection