The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreBackground. After tooth extraction, alveolar bone resorption is inevitable. This clinical phenomenon challenges dental surgeons aiming to restore esthetic and function. Alveolar ridge preservation can be applied to minimize dimensional changes with a new socket grafting material, an autogenous dentin graft, produced by mechanically and chemically processing natural teeth. This study assessed the safety and efficacy of using autogenous dentin biomaterial in alveolar ridge preservation. Materials and Methods. Patients with nonrestorable maxillary anterior teeth bounded by natural sound teeth were included in this study. After a detailed clinical and tomographic examination, eligible participants were randomly allocated into two groups
... Show MoreCopper oxide (CuO) nanoparticles were synthesized through the thermal decomposition of a copper(II) Schiff-base complex. The complex was formed by reacting cupric acetate with a Schiff base in a 2:1 metal-to-ligand ratio. The Schiff base itself was synthesized via the condensation of benzidine and 2-hydroxybenzaldehyde in the presence of glacial acetic acid. This newly synthesized symmetric Schiff base served as the ligand for the Cu(II) metal ion complex. The ligand and its complex were characterized using several spectroscopic methods, including FTIR, UV-vis, 1H-NMR, 13C-NMR, CHNS, and AAS, along with TGA, molar conductivity and magnetic susceptibility measurements. The CuO nanoparticles were produced by thermally decomposing the
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis work aimed to investigate the prevalence of pathogenic fungi and evaluate the antifungal activity of Trichoderma orientale FMR12486 crude extract against pathogenic fungi isolated from patients attending the National Center for Thoracic and Respiratory Diseases (having a history of tuberculosis) and consultant of Dermatology of Baghdad hospital, Iraq. A total of 80 clinical specimens were collected: 20 skin scrapings specimens and 60 sputum specimens. The results of direct examination by KOH 10% and culture showed that 11 (55%) cases from 20 skin specimens were positive for fungal infections, while in the sputum specimens, 28 (47%) cases from 60 were positive. Candida albicans represented the most common fungal infection isolat
... Show MoreThis paper presents a method to organize memory chips when they are used to build memory systems that have word size wider than 8-bit. Most memory chips have 8-bit word size. When the memory system has to be built from several memory chips of various sizes, this method gives all possible organizations of these chips in the memory system. This paper also suggests a precise definition of the term “memory bank” that is usually used in memory systems. Finally, an illustrative design problem was taken to illustrate the presented method practically
Shabak is one of minority related to Kurdish nation , speaking Bajalan variety especially Goran Dialect.
This study is a historic and diactological study about Kurdish Bajalan variety.The study is composed an introduction and tw0 chapters. The first chapter talks about Bajalan variety , and it has two axes . In the first axe , I talk about the geography of Bajalan variety and in the second axes the map of goran dialect . The second chapter is about Shabak variety and it is constituted of three axes : The first section is about Shabak variety , in the second section is allocated to the domicile of Shabak variety and in the third section , talks about the saint of shabak and in the end the
... Show MoreTotal quality management considers one of the modern scientific entrances which practiced by productivity service organizations alike to provide appropriate quality required outputs according to the needs and desires of customers manage , enable the organization seeking to continue and grow in light of the increasing competition from the satisfy and provide the appropriate total quality management requirements whenever led to face risks that they may have in a manner in which they can be addressed and find ways to avoid them in the future when repeated. &n
... Show More