Preferred Language
Articles
/
3xYEzYcBVTCNdQwCm2Fd
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (HPM), or any assumptions to deal with the nonlinear term. The obtained solutions are in recursive sequence forms which can be used to achieve the closed or approximate form of the solutions. Also, the fixed point theorem was presented to assess the convergence of the proposed methods. Several examples of 1D, 2D and 3D problems are solved either analytically or numerically, where the efficiency of the numerical solution has been verified by evaluating the absolute error and the maximum error remainder to show the accuracy and efficiency of the proposed methods. The results reveal that the proposed iterative methods are effective, reliable, time saver and applicable for solving the problems and can be proposed to solve other nonlinear problems. All the iterative process in this work implemented in MATHEMATICA®12. ABSTRAK: Kajian ini berkenaan tiga kaedah berulang boleh percaya diberikan dan dilaksanakan bagi menyelesaikan 1D, 2D dan 3D persamaan Fisher. Kaedah Daftardar-Jafari (DJM), kaedah Temimi-Ansari (TAM) dan kaedah pengecutan Banach (BCM) digunakan bagi mendapatkan penyelesaian numerik dan tepat bagi persamaan Fisher. Kaedah berulang boleh percaya di kategorikan dengan pelbagai faedah, seperti bebas daripada terbitan, mengatasi masalah-masalah yang timbul apabila sempadan polinomial bagi mengurus kata tak linear dalam kaedah penguraian Adomian (ADM), tidak memerlukan kiraan pekali Lagrange sebagai kaedah berulang Variasi (VIM) dan tidak perlu bagi membuat homotopi sebagaimana dalam kaedah gangguan Homotopi (HPM), atau mana-mana anggapan bagi mengurus kata tak linear. Penyelesaian yang didapati dalam bentuk urutan berulang di mana ianya boleh digunakan bagi mencapai penyelesaian tepat atau hampiran. Juga, teorem titik tetap dibentangkan bagi menaksir kaedah bentuk hampiran. Pelbagai contoh seperti masalah 1D, 2D dan 3D diselesaikan samada secara analitik atau numerik, di mana kecekapan penyelesaian numerik telah ditentu sahkan dengan menilai ralat mutlak dan baki ralat maksimum (MER) bagi menentukan ketepatan dan kecekapan kaedah yang dicadangkan. Dapatan kajian menunjukkan kaedah berulang yang dicadangkan adalah berkesan, boleh percaya, jimat masa dan boleh guna bagi menyelesaikan masalah dan boleh dicadangkan menyelesaikan masalah tak linear lain. Semua proses berulang dalam kerja ini menggunakan MATHEMATICA®12.

Crossref
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Aip Conference Proceedings
Synthesis and characterization study of n-Bi2O3/p-Si heterojunction dependence on thickness
...Show More Authors

View Publication
Scopus (13)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Mathematical Biology And Neuroscience
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (25)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Plant Archives
Effects of bacterocin from MRSA and pseudomonas aeruginosaagainst biofilm of food born pathogen
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Sep 24 2023
Journal Name
Arab World English Journal
The Correlation between EFL Learners’ Academic Intelligence and the Level of Productive Skills
...Show More Authors

Communicating effectively by gaining productive skills in a classroom setting is one of the critical goals of learning the English language. The current study was conducted to explore the correlation of EFL learners’ level of academic intelligence with their productive skills. The study tries to find an answer to what is the correlation between EFL learners’ academic intelligence and level of production skills. The study population represents EFL students at the departments of English language of the Iraqi Colleges of Education for the academic year (2022-2023). The sample includes 310 EFL students selected from the 3rd year of the Department of English of the College of Education, Ibn-Rushd for Human Sciences/University of Bagh

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Craniofacial Surgery
Effect of Platelet-Rich Fibrin and Bone Morphogenetic Protein on Dental Implant Stability
...Show More Authors

Abstract: Recombinant human bone morphogenetic protein-2 (rhBMP-2) and platelet-rich fibrin (PRF) bioactive materials have been used to enhance healing and improve dental implant stability. This study aimed to compare the effect of rhBMP-2 and PRF bioactive materials on dental implant stability at different intervals and to evaluate the correlation of implant length and diameter with implant stability. Two bioactive materials were compared to evaluate their effect on dental implant stability. A total of 32 patients (102 dental implants) were divided into 3 groups: 24 dental implants with bone morphogenetic protein (BMP), 27 dental implants with PRF, and 51 dental implants without BMP or PRF (control group). Data were statistically analyzed

... Show More
View Publication
Scopus (17)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (230)
Crossref (176)
Scopus Clarivate Crossref
Publication Date
Mon Jul 04 2022
Journal Name
Al Mustansiriyah Journal Of Pharmaceutical Sciences
Bis-Schiff Bases of Isatin Derivatives Synthesis, and their Biological Activities: A Review
...Show More Authors

Isatin is a heterocyclic molecule that belongs to one of the most important classes of organic compounds known as indolines. Isatin, isatin analogs, and their Schiff bases have recently attracted a lot of attention in medicinal chemistry. Isatin, itself, shows various biological activities such as antiviral, anticancer, antimicrobial, anti-inflammatory, analgesic, antioxidant, and anticonvulsant. Bis- Schiff bases containing isatin moiety have been known to possess a wide spectrum of pharmacological activities. This review offers up-to-date information on the most active isatin bis-Schiff bases, which would include anticancer, antimicrobial, antiviral, anticonvulsant, anti-inflammatory, and analgesic activities. These observations c

... Show More
View Publication
Crossref (9)
Crossref