Preferred Language
Articles
/
bsj-4360
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key is decreased about 66%. On the other hand, the distance is decreased less than 1% when the multiplier is larger than 66. Therefore, to avoid attacking by using the proposed method, the multiplier which is larger than 66 should be chosen. Furthermore, it is shown that if the public key equals 3, the multiplier always equals 2.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Russian Journal Of General Chemistry
Synthesis, Characterization, and Biological Evaluation for New Derivatives Based on 2Сhloro-N-[4-(5-phenyl-1,3,4-oxadiazol-2-yl)phenyl]acetamide
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Russian Journal Of General Chemistry
Synthesis, Characterization, and Biological Evaluation for New Derivatives Based on 2Сhloro-N-[4-(5-phenyl-1,3,4-oxadiazol-2-yl)phenyl]acetamide
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun May 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A New Design of Fractal Optical Modulation
...Show More Authors

In this paper it was designed a new fractal optical modulation by using a new iteration of fractal function, the result was analyzed by MTF evaluation, and it compared with results of normal optical modulation.

The normal and fractal optical modulator is a circular disc which has a radius R=9cm, both of them consist of twenty sectors, ten sectors are opaque and the other ten sectors are transmitted for the light.

      The fractal optical modulator contains two patterns, the pattern two can be used to detect the target, and pattern one can be used to lock the target

The best similarity of MTF behavior for normal and fractal Reticle was evaluating the power transparent depends on the size o

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Negative Reflections of Ottomans and Persian struyy on Iraq (1508 – 1914)
...Show More Authors

Continuous conflict between Parisian and Ottoman states the results that Iraq became as
aground for their battles which leads to their own interests in Iraq which are shape their
strategy. The conflict continues for long time. In spite of, they signed many treatments and
protocols between the two sides, as Arzarom treaty , the first and the second, Tahran protocols
, and Astana protocol. This conflict, no sides of them to dose any part of their land, but these
treaties leaded to a big loss to Iraq ,which lost parts of it's land and water area in Ahwaz and
shatt AL-Arab, so, Iraq became as a smoth target for their interests, and lost its
sovereignty,and lost self-govern of the country country . so the research conclud

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the impact of corporate governance mechanisms on social responsibility reports for a sample of Iraqi companies listed on the Iraq Stock Exchange
...Show More Authors

The study aims to indicate the role of the mechanisms and principles of corporate governance in the activation of social responsibility reports, and increase disclosure, to achieve sustainability, legitimacy, and integrity of the business. Through the presentation of the conceptual framework for corporate governance and social responsibility, identify the key dimensions of social responsibility and the statement of the relationship between the mechanisms of governance and social responsibility reports in accordance with these dimensions. To prove the hypothesis research has selected a sample of listed companies in the Iraqi market for securities,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Construction Joints on Performance of Reinforced Concrete Beams
...Show More Authors

Construction joints are stopping places in the process of placing concrete, and they are required because in many structures it is impractical to place concrete in one continuous operation. The amount of concrete that can be placed at one time is governed by the batching and mixing capacity and by the strength of the formwork. A good construction joint should provide adequate flexural and shear continuity through the interface.

In this study, the effect of location of construction joints on the performance of reinforced concrete structural elements is experimentally investigated.

Nineteen beam specimens with dimensions of 200×200×950 mm were tested. The variables investigated are the location of the construction joints

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Using the artificial TABU algorithm to estimate the semi-parametric regression function with measurement errors
...Show More Authors

Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.

Scopus Crossref
Publication Date
Tue Apr 01 2003
Journal Name
Abhath Al- Yarmouk [basic Sciences And Engineering]
Methodology for selecting Nonprestressed Steel in Post- Tensioning Beams
...Show More Authors

Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref