The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.
Since 1990 internal combustion engines and variable systems has been considered as emission. Noise can be defined as undesirable sound, and in high levels it can be considered ahealth hazard. Large internal combustion engines produce high levels of noise. In many countries there are laws restricting the noise levels in large engine rooms and fixed applications. Locomotives engines have the minimum emission influence because of noise control techniques capability.
In this paper study on a single cylinder internal combustion engine was conducted. The engine works by adding ethanol to gasoline, at variable speeds, without adding ethanol, and with adding 10 and 20% ethanol in volumetric ratio. Using one sound insulator or two or with
... Show MorePurpose To test the effect of strategic Supremacy on strategic success A case study in Thi Qar Governorate, methodology/approach – this is a mandatory entry.
a case study was used and applied to the Department managers of Government of the province of Thi Qar, Research limitations/implications – It is clear that the strategic Supremacy variable is not being used effectively to achieve strategic success.
Practical implications – use strategic supremacy positively to Support for strategic success. implementing and monitoring ignorance of them in how to use thi
... Show MoreThis study investigates the Linguistic and Conceptual equivalence of Conner’s Revised Scales when applied on a Sudanese sample. Sudanese parents and teachers completed behavior-rating scales on a stratified sample of 200 children. These instruments were based on Conner’s parent -48 and teacher-28 questionnaires. Following a reliable translation into Sudanese Arabic the test-retest reliability of the items and the internal consistency of the original Conner’s' revised scales were explored. The associations between scale scores and between parents and teachers scores were also examined. Both instruments displayed good reliability and the original Conners scales had satisfactory internal consistency. The inter-correlation sugg
... Show MoreThis paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
The problem of research was the lack of research that dealt with issue of the job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of job enrichment, and knowledge capitalon strategic success, starting from the hypothesis that there significant impact of job enrichment and knowledge capital on strategic success, to achieve this goal the researchers from the theoretical literature and related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted job enrichment as independent variable while knowledge capital plays two roles, the first as an independent variable and the second as an intermediate
... Show MoreThis work presents an experimental study of heat transfer and flow of distilled water and metal oxide nanofluid Fe3O4-distilled water at concentrations of (φ = 0.3, 0.6, 0.9 %) by volume in a horizontal pipe with constant magnetic field. All the tests are carried out with Reynolds number range (2900-9820) and uniform heat flux (11262-19562 W/m2). The results show that, the nanofluid concentration and magnetic intensity increase, the Nusselt number increases. The maximum enhancement in Nusselt number with magnetic nanofluid is (5.4 %, 26.4 %, 42.7 %) for volume concentration (0.3, 0.6, 0.9 %) respectively. The enhancement is maximized with magnetic intensity (0.1, 0.2, 0.3 tesla) respectively to (43.9, 44
... Show MoreA solar updraft tower power plant (solar tower) is a solar thermal power plant that utilizes a combination of solar
air collector and central updraft tube to generate an induced convective flow which drives pressure staged turbines to generate electricity.
This paper presents practical results of a prototype of a solar chimney with thermal mass, where the glass surface is replaced by transparence plastic cover. The study focused on chimney's basements kind effect on collected air temperatures. Three basements were used: concrete, black concrete and black pebbles basements. The study was conducted in Baghdad from August to November 2009.
The results show that the best chimney efficiency attaine
... Show MoreThe paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev
... Show MoreIn this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.