Preferred Language
Articles
/
3xYEzYcBVTCNdQwCm2Fd
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (HPM), or any assumptions to deal with the nonlinear term. The obtained solutions are in recursive sequence forms which can be used to achieve the closed or approximate form of the solutions. Also, the fixed point theorem was presented to assess the convergence of the proposed methods. Several examples of 1D, 2D and 3D problems are solved either analytically or numerically, where the efficiency of the numerical solution has been verified by evaluating the absolute error and the maximum error remainder to show the accuracy and efficiency of the proposed methods. The results reveal that the proposed iterative methods are effective, reliable, time saver and applicable for solving the problems and can be proposed to solve other nonlinear problems. All the iterative process in this work implemented in MATHEMATICA®12. ABSTRAK: Kajian ini berkenaan tiga kaedah berulang boleh percaya diberikan dan dilaksanakan bagi menyelesaikan 1D, 2D dan 3D persamaan Fisher. Kaedah Daftardar-Jafari (DJM), kaedah Temimi-Ansari (TAM) dan kaedah pengecutan Banach (BCM) digunakan bagi mendapatkan penyelesaian numerik dan tepat bagi persamaan Fisher. Kaedah berulang boleh percaya di kategorikan dengan pelbagai faedah, seperti bebas daripada terbitan, mengatasi masalah-masalah yang timbul apabila sempadan polinomial bagi mengurus kata tak linear dalam kaedah penguraian Adomian (ADM), tidak memerlukan kiraan pekali Lagrange sebagai kaedah berulang Variasi (VIM) dan tidak perlu bagi membuat homotopi sebagaimana dalam kaedah gangguan Homotopi (HPM), atau mana-mana anggapan bagi mengurus kata tak linear. Penyelesaian yang didapati dalam bentuk urutan berulang di mana ianya boleh digunakan bagi mencapai penyelesaian tepat atau hampiran. Juga, teorem titik tetap dibentangkan bagi menaksir kaedah bentuk hampiran. Pelbagai contoh seperti masalah 1D, 2D dan 3D diselesaikan samada secara analitik atau numerik, di mana kecekapan penyelesaian numerik telah ditentu sahkan dengan menilai ralat mutlak dan baki ralat maksimum (MER) bagi menentukan ketepatan dan kecekapan kaedah yang dicadangkan. Dapatan kajian menunjukkan kaedah berulang yang dicadangkan adalah berkesan, boleh percaya, jimat masa dan boleh guna bagi menyelesaikan masalah dan boleh dicadangkan menyelesaikan masalah tak linear lain. Semua proses berulang dalam kerja ini menggunakan MATHEMATICA®12.

Crossref
View Publication
Publication Date
Wed Jun 01 2022
Journal Name
Heliyon
Modification of SBA-15 mesoporous silica as an active heterogeneous catalyst for the hydroisomerization and hydrocracking of n-heptane
...Show More Authors

View Publication
Scopus (76)
Crossref (74)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Results In Materials
Adsorption, thermodynamic and corrosion study of enalapril malate pharmaceutical drug as corrosion inhibitor for carbon steel in saline solution
...Show More Authors

Unused and expired pharmaceutical drugs are a novel type of organic corrosion inhibitor. They are less expensive, more effective, and less harmful than conventional organic corrosion inhibitors. This study investigated the effects of concentration, adsorption mechanism and thermodynamic parameters of enalapril malate (ENAP) as a corrosion inhibitor for carbon steel in a saline solution (3.5 % NaCl). The polarization method was used to determine the corrosion rate and inhibition efficiency. Field emission scanning electron microscopy (FE-SEM) and atomic force spectroscopy (AFM) were used to investigate the surface morphology and topography of carbon steel after immersion in both uninhibited and inhibited media for 24 h. Fourier transform inf

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 10 2017
Journal Name
Superconductor Science And Technology
Conceptual designs of conduction cooled MgB<sub>2</sub> magnets for 1.5 and 3.0 T full body MRI systems
...Show More Authors

View Publication
Scopus (66)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Journal Of Educational And Psychological Researches
Under the title "ideas to demonstrate and prove some new insight into the measurement of psychological and educational assessment"Paragraphs of the psychometric analysis between the logical and virtual (for arbitrators experts and specialists) and the sta
...Show More Authors

   Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
   Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the group 𝓢𝓛(2,38)
...Show More Authors

Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Behavioral Therapy for Internet Addicts
...Show More Authors

The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups:  a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess

... Show More
View Publication Preview PDF
Publication Date
Sat Nov 01 2014
Journal Name
Iosr Journal Of Dental And Medical Sciences (iosr-jdms)
Cutaneous leishmaniasis: Comparative Techniques for Diagnosis
...Show More Authors

AR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14

View Publication
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design &amp; Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Journal Of The Sixth Conference Of The Faculty Of Languages
Utilizing Computers for Developing Students Skills
...Show More Authors

NAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010

View Publication