This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.
The hydraulic conditions of a flow previously proved to be changed when placing large-scale geometric roughness elements on the bed of an open channel. These elements impose more resistance to the flow. The geometry of the roughness elements, the numbers used, and the configuration are parameters that can affect the hydraulic flow characteristics. The target is to use inclined block elements to control the salt wedge propagation pointed in most estuaries to prevent its negative effects. The Computational Fluid Dynamics CFD Software was used to simulate the two-phase flow in an estuary model. In this model, the used block elements are 2 cm by 3 cm cross-sections with an inclined face in the flow direction, with a length
... Show MoreAdsorption techniques are widely used to remove organics pollutants from waste water particularly, when using low cost adsorbent available in Iraq. Al-Khriet powder which was found in legs of Typha Domingensis is used as bio sorbent for removing phenolic compounds from aqueous solution. The influence of adsorbent dosage and contact time on removal percentage and adsorb ate amount of phenol and 4- nitro phenol onto Al-Khriet were studied. The highest adsorption capacity was for 4-nitrophenol 91.5% than for phenol 82% with 50 mg/L concentration, 0.5 gm. dosage of adsorbent and pH 6 under a batch condition. The experimental data were tested using different isotherm models. The results show that Freundlich model resulted in the best fit also
... Show MoreMany conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean
In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreTo accommodate utilities in buildings, different sizes of openings are provided in the web of reinforced concrete deep beams, which cause reductions in the beam strength and stiffness. This paper aims to investigate experimentally and numerically the effectiveness of using carbon fiber reinforced polymer (CFRP) strips, as a strengthening technique, to externally strengthen reinforced concrete continuous deep beams (RCCDBs) with large openings. The experimental work included testing three RCCDBs under five-point bending. A reference specimen was prepared without openings to explore the reductions in strength and stiffness after providing large openings. Openings were created symmetrically at the center of spans of the other specimens
... Show More