Preferred Language
Articles
/
bsj-5541
Attacking Jacobian Problem Using Resultant Theory
...Show More Authors

     This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type:  ,            and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Boubaker Wavelets Functions: Properties and Applications
...Show More Authors

This paper is concerned with introducing an explicit expression for orthogonal Boubaker polynomial functions with some important properties. Taking advantage of the interesting properties of Boubaker polynomials, the definition of Boubaker wavelets on interval [0,1) is achieved. These basic functions are orthonormal and have compact support. Wavelets have many advantages and applications in the theoretical and applied fields, and they are applied with the orthogonal polynomials to propose a new method for treating several problems in sciences, and engineering that is wavelet method, which is computationally more attractive in the various fields. A novel property of Boubaker wavelet function derivative in terms of Boubaker wavelet themsel

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Study the Effect of Solar Radiation Pressure at Several Satellite Orbits
...Show More Authors

The effects of solar radiation pressure at several satellite (near Earth orbit satellite, low Earth orbit satellite, medium Earth orbit satellite and high Earth orbit satellite ) have been investigated. Computer simulation of the equation of motion with perturbations using step-by-step integration (Cowell's method) designed by matlab a 7.4 where using Jacobian matrix method to increase the accuracy of result.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 27 2020
Journal Name
Journal Of The College Of Education For Women
The Term Delay and its Jurisprudences in the Section of Punishments and Felonies
...Show More Authors

Different Arabic and Islamic societies are free of evil instincts. Therefore, certain provisions of legitimacy came to stress the importance of the intentions of sharia to achieve the interests of all people that involve several aspects, including the five fundamental things: religion, oneself, offspring, mind and money. Almighty Allah has specified certain punishments on those who violate these things by imposing punishments on the part of the criminal to preserve souls. He imposes the penalty of theft to preserve property, the Hadd punishment for adultery to preserve the symptoms, the punishment on the drunk to preserve the mind, and the Hadd punishment for the apostate to preserve the religion. By the adherence to these punishments li

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
Security of Wireless Sensor Nodes
...Show More Authors

Due to the large-scale development in satellite and network communication technologies, there is a significant demand for preserving the secure storage and transmission of the data over the internet and shared network environments. New challenges appeared that are related to the protection of critical and sensitive data
from illegal usage and unauthorized access. In this paper, we address the issues described above and develop new techniques to eliminate the associated problems. To achieve this, we propose a design of a new sensor node for tracking the location of cars and collecting all information and all visited locations by cars, followed by
encryption in a sensor node and saving in the database. A microcontroller of Arduino es

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Sep 29 2020
Journal Name
Iraqi Journal Of Science
A New Beta Chaotic Map with DNA Encoding for Color Image Encryption
...Show More Authors

Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used for shuffling the DNA color image. In addition, two chaotic maps, namely the proposed new Beta and Sine chaotic maps, are used for key generation. Finally, the DNA XOR operation is applied between the generated key and shuffled DNA i

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Application of “LIML_LVR” method practically according to the general formula K-CLASS on suggestion simultaneous equation
...Show More Authors

في هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2007
Journal Name
Journal Of Educational And Psychological Researches
فاعلية المعلمين في تطبيق نموذج بنائي في تدريس العلوم للصف الثاني الاساسي في بغداد
...Show More Authors

        

 هدفت هذه الدراسة الى التعرف على مدى فاعلية المعلمين في تطبيق نموذج بنائي في تدريس مادة العلوم للصف الثاني الأساسي . وقد استخدمت استراتيجيات نوعية في جمع البيانات وتحليلها . وأوضحت نتائج الدراسة ان المعلمين تقربوا أكثر إلى السلوك البنائي , وابدوا رغبة في استخدام استراتيجيات بنائية في تدريسهم للعلوم . واختتمت الدراسة بمجموعة من التوصيات .

  &nbsp

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Some K-Banhatti Polynomials of First Dominating David Derived Networks
...Show More Authors

Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jul 30 2023
Journal Name
Iraqi Journal Of Science
Detour Polynomial of Theta Graph
...Show More Authors

     Let  be any connected graph with vertices set  and edges set .  For any two distinct vertices  and , the detour distance between  and  which is denoted by  is a longest path between  and  in a graph . The detour polynomial of a connected graph  is denoted by ;  and is defined by . In this paper, the detour polynomial of the theta graph and the uniform theta graph will be computed.

View Publication Preview PDF
Scopus Crossref