Preferred Language
Articles
/
bsj-5541
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
STATISTICAL ANALYSIS OF PATIENTS INFECTED WITH CORONAVIRUS USING MANOVA
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Oct 06 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Image segmentation by using thresholding technique in two stages
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Studying Hueckel edge detector using binary step edge image
...Show More Authors

Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Mon Sep 19 2016
Journal Name
Spie Proceedings
Simulation of push-pull inverter using wide bandgap devices
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jun 23 2023
Journal Name
Al-mustansiriyah Journal Of Science
Image Encryption Using New Non-Linear Stream Cipher Cryptosystem
...Show More Authors

In this paper, we designed a new efficient stream cipher cryptosystem that depend on a chaotic map to encrypt (decrypt) different types of digital images. The designed encryption system passed all basic efficiency criteria (like Randomness, MSE, PSNR, Histogram Analysis, and Key Space) that were applied to the key extracted from the random generator as well as to the digital images after completing the encryption process.

Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Geological Journal
Purification of Aqueous Solutions from Nickel Using Ceramic Waste
...Show More Authors

This study aims to test ceramic waste's capacity to remove nickel from aqueous solutions through adsorption. Ceramic wastes were collected from the Refractories Manufacturing Plant in Ramadi. Through a series of lab tests, the reaction time (5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 minutes, and Ni concentrations (20, 40, 60, and 80) were tested using ceramic wastes with a solid to liquid ratio of 2g/30ml. At a temperature of 30ºC, the pH, total dissolved solids (TDS), and electrical conductivity (EC) were all measured. The equilibrium time was set at 30 min. Thereafter, the sorption (%) somewhat increased positively with the Ni concentration. Freundlich's equation showed that the adsorption intensity is 1.1827 and the Freundlich c

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Molding and simulation sedimentation process using finite difference method
...Show More Authors
Abstract<p>The goal of this research is to develop a numerical model that can be used to simulate the sedimentation process under two scenarios: first, the flocculation unit is on duty, and second, the flocculation unit is out of commission. The general equation of flow and sediment transport were solved using the finite difference method, then coded using Matlab software. The result of this study was: the difference in removal efficiency between the coded model and operational model for each particle size dataset was very close, with a difference value of +3.01%, indicating that the model can be used to predict the removal efficiency of a rectangular sedimentation basin. The study also revealed</p> ... Show More