The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreThis paper sheds the light on the vital role that fractional ordinary differential equations(FrODEs) play in the mathematical modeling and in real life, particularly in the physical conditions. Furthermore, if the problem is handled directly by using numerical method, it is a far more powerful and efficient numerical method in terms of computational time, number of function evaluations, and precision. In this paper, we concentrate on the derivation of the direct numerical methods for solving fifth-order FrODEs in one, two, and three stages. Additionally, it is important to note that the RKM-numerical methods with two- and three-stages for solving fifth-order ODEs are convenient, for solving class's fifth-order FrODEs. Numerical exa
... Show MoreThe attached Cyanophyta community is a model for monitoring aquatic systems and interpreting environmental change in aquatic systems. The present study aims to conduct a seasonal study on Cyanophyta attached to the concrete abutments of three bridges (Al-Jadriya Bridge, Bab Al-Moadam Bridge, and Al-Muthanna Bridge) in the Tigris River within the city of Baghdad, central Iraq (from October 2021 to June 2022). The study included the quality of Cyanophyta and, the eleven environmental parameters (water temperature, electric conductivity, salinity, pH, total alkalinity, Calcium, Magnesium, dissolved oxygen, total dissolved solids, total phosphorus, and total nitrogen). Monthly samples were taken from the water under each bridge from three sa
... Show MoreIn this paper, we present new algorithm for the solution of the second order nonlinear three-point boundary value problem with suitable multi boundary conditions. The algorithm is based on the semi-analytic technique and the solutions which are calculated in the form of a rapid convergent series. It is observed that the method gives more realistic series solution that converges very rapidly in physical problems. Illustrative examples are provided to demonstrate the efficiency and simplicity of the proposed method in solving this type of three point boundary value problems.
To follow up the response of acute lymphoblastic leukemic
(ALL) patients to chemotherapy treatment and for prognosis, diagnosis, the total Sialic acid (TSA) levels was studied as a tumor marker. The study included 40 patients (male = 22, female =18) with (ALL) were tested for the serum and leukocytes homogenate concentrations of total sialic acid (TSA) before and after treatment with six different chemotherapy protocols. &n
... Show MoreHuman Adenosine deaminase is an essential enzyme for modulating the bioactivity of thyroid hormones, and It is important for the maturation and differentiation of lymphocytes, although its clinical importance in thyroid diseases have yet to be identified. Objective: The aim of the current study is to determine the Adenosine deaminase concentration in healthy controls, and in autoimmune thyroid diseases such as Graves' Disease, and Hashimoto's Thyroiditis. Patients and methods: A total of 183 serum specimens of 103 female patients with autoimmune thyroid diseases and 80 healthy control groups were included in this study and collected from the Baghdad Medical City, Iraq. Quantitative Human Adenosine Deaminase ELISA kits were used to estimate
... Show MoreAbstract A description study was carried through out the present study aimed to assess health education provided by nurses to patient with gall stone "obstructive jaundice". The study was conducted at 4 teaching hospital, Baghdad teaching hospital, Al-Karama teaching hospital, Al-Yarmook teaching hospital, Al-Kendy teaching hospital where choloecystectomy was performed, in the period from first of June 2004 to end of July 2004. Data were collected through the use of questionnaire an interview from which was developed for the purpose of the present study. A non-probability (purposive) sample which was consist
This research deals with a part of our heritage and Arab culture, which is the poetry of contemporary Islamic poets, especially the poetry that was said in the mother in contemporary Islamic poetry, when extrapolating the offices of some contemporary Islamic poets found a clear presence of the mother, and during the search for the subject or its I found that the subject did not receive research and study, although the bureaus of contemporary Islamic poets included in it a huge amount of verses in which they stood at the mother Pharthua, and expressed their feelings and emotions towards them, and accordingly this research tagged (mother in contemporary Islamic poetry _ Dr Artistic models in models of contemporary Islamic poetry) to stand
... Show MoreIn this research, the concentration of radon gas has been calculated in the classrooms of schools in Diyala Governorate by using the nuclear track detector (CR-39), which was one of the organic solid-state nuclear detectors (SSNTDs). After calculating the radon gas concentration, the lung cancer cases were calculated. The results showed that the lowest value was found in (Alshumue) school (4.753) people. In contrast, the highest value was found in (Habhib) school (20.421). The average values of lung cancer cases in Diyala governorate were equal to (9.319) per person. The results showed that the number of lung cancer cases per year per million persons in Diyala Governorate schools was below the allowed limit from (ICRP) agency (170-230) p
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.