In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (HPM), or any assumptions to deal with the nonlinear term. The obtained solutions are in recursive sequence forms which can be used to achieve the closed or approximate form of the solutions. Also, the fixed point theorem was presented to assess the convergence of the proposed methods. Several examples of 1D, 2D and 3D problems are solved either analytically or numerically, where the efficiency of the numerical solution has been verified by evaluating the absolute error and the maximum error remainder to show the accuracy and efficiency of the proposed methods. The results reveal that the proposed iterative methods are effective, reliable, time saver and applicable for solving the problems and can be proposed to solve other nonlinear problems. All the iterative process in this work implemented in MATHEMATICA®12. ABSTRAK: Kajian ini berkenaan tiga kaedah berulang boleh percaya diberikan dan dilaksanakan bagi menyelesaikan 1D, 2D dan 3D persamaan Fisher. Kaedah Daftardar-Jafari (DJM), kaedah Temimi-Ansari (TAM) dan kaedah pengecutan Banach (BCM) digunakan bagi mendapatkan penyelesaian numerik dan tepat bagi persamaan Fisher. Kaedah berulang boleh percaya di kategorikan dengan pelbagai faedah, seperti bebas daripada terbitan, mengatasi masalah-masalah yang timbul apabila sempadan polinomial bagi mengurus kata tak linear dalam kaedah penguraian Adomian (ADM), tidak memerlukan kiraan pekali Lagrange sebagai kaedah berulang Variasi (VIM) dan tidak perlu bagi membuat homotopi sebagaimana dalam kaedah gangguan Homotopi (HPM), atau mana-mana anggapan bagi mengurus kata tak linear. Penyelesaian yang didapati dalam bentuk urutan berulang di mana ianya boleh digunakan bagi mencapai penyelesaian tepat atau hampiran. Juga, teorem titik tetap dibentangkan bagi menaksir kaedah bentuk hampiran. Pelbagai contoh seperti masalah 1D, 2D dan 3D diselesaikan samada secara analitik atau numerik, di mana kecekapan penyelesaian numerik telah ditentu sahkan dengan menilai ralat mutlak dan baki ralat maksimum (MER) bagi menentukan ketepatan dan kecekapan kaedah yang dicadangkan. Dapatan kajian menunjukkan kaedah berulang yang dicadangkan adalah berkesan, boleh percaya, jimat masa dan boleh guna bagi menyelesaikan masalah dan boleh dicadangkan menyelesaikan masalah tak linear lain. Semua proses berulang dalam kerja ini menggunakan MATHEMATICA®12.
Rare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as
... Show MoreIn this study, mesoporous silica (MPS) is made using the sol-gel method from a cheap source (Na2SiO3) using the surfactant hydroxycetyl hydroxyethyl dimonium chloride as a template. The task is the adsorption-based removal of the medication metoprolol (MP) at concentrations between 10 and 50 ppm. Variables such as: contact time, dose of adsorbent, starting concentration of adsorbate, and adsorption temperature were studied which show the equilibrium time and adsorbent dose are 40 min and 0.05 g respectively. The Langmuir, Freundlich, Temkin, and Dubinin-Radushkevich isotherm models were fitted to the data obtained from the experiments. Comparing the outcomes showed that, of the four investigated isotherm models, the Freundlich equation m
... Show MoreCognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.
Schema and text world theories are useful tools in cognitive stylistic stud
... Show MoreSoftware-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr
... Show MoreFarmers keep trying to avoid using chemical fertilizer without losing high yield. A field experiment was conducted in the fields of Agriculture College, University of Baghdad during winter seasons of 2015 and 2016 to investigate the response of three bread wheat (Triticum aestivum L.) cultivars (Ibaa99, Abu-Ghraib3 and Buhooth22) to the frequency of spraying with biofertilizer (EM-1) (one time at tillering stage, twice at tillering and stem elongation stages and three times at tillering, stem elongation and booting stages) in addition to the control (without spraying), to the increase of grain yield. Randomized complete block design (RCBD), in split plots arrangement and four replications, was used. Spraying treatments were placed as main p
... Show MoreMorus alba, member of the Moraceae family, is a perennial tree utilized in folk medicine, preparing the modern drug, and considered the main food for silkworms. However, data on chemical content in the leaves is still limited; the main objective of this study is to detect the presence and determine the concentration of different polyphenolic constituents in the leaves of the Morus alba plant by reverse phase-high performance liquid chromatography (RP-HPLC) and evaluate the cytotoxic effect of ethyl acetate extract of this plant on human breast cancer (AMJ-13) cell line. Phytochemical analysis of the Morus alba leaves ethyl acetate extract led to identifying and quantification of six polyphenolic constituents designated as phenolic a
... Show MoreTo date, comprehensive reviews and discussions of the strengths and limitations of Remote Sensing (RS) standalone and combination approaches, and Deep Learning (DL)-based RS datasets in archaeology have been limited. The objective of this paper is, therefore, to review and critically discuss existing studies that have applied these advanced approaches in archaeology, with a specific focus on digital preservation and object detection. RS standalone approaches including range-based and image-based modelling (e.g., laser scanning and SfM photogrammetry) have several disadvantages in terms of spatial resolution, penetrations, textures, colours, and accuracy. These limitations have led some archaeological studies to fuse/integrate multip
... Show MoreThe present work focuses on the changing of the structural characteristics of the grown materials through different material characterization methods. Semiconductor CdSxSe 1-x nano crystallines have been synthesized by chemical vapor depostion. (X- ray Diffraction; XRD), (Field Emission Scanning Electron Microscopy; FESEM), measured the characterization of Semiconductor CdSxSe1-x nano crystallines. The optical properties of semiconductor CdSxSe1-x nanocrystallines have been studied by the photoluminescence (PL) (He-Cd pulsed ultraviolet laser at 325nm excitation wavelength) at room temperature. The results showed the change rule of photoluminsence peak at different S
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More