In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (HPM), or any assumptions to deal with the nonlinear term. The obtained solutions are in recursive sequence forms which can be used to achieve the closed or approximate form of the solutions. Also, the fixed point theorem was presented to assess the convergence of the proposed methods. Several examples of 1D, 2D and 3D problems are solved either analytically or numerically, where the efficiency of the numerical solution has been verified by evaluating the absolute error and the maximum error remainder to show the accuracy and efficiency of the proposed methods. The results reveal that the proposed iterative methods are effective, reliable, time saver and applicable for solving the problems and can be proposed to solve other nonlinear problems. All the iterative process in this work implemented in MATHEMATICA®12. ABSTRAK: Kajian ini berkenaan tiga kaedah berulang boleh percaya diberikan dan dilaksanakan bagi menyelesaikan 1D, 2D dan 3D persamaan Fisher. Kaedah Daftardar-Jafari (DJM), kaedah Temimi-Ansari (TAM) dan kaedah pengecutan Banach (BCM) digunakan bagi mendapatkan penyelesaian numerik dan tepat bagi persamaan Fisher. Kaedah berulang boleh percaya di kategorikan dengan pelbagai faedah, seperti bebas daripada terbitan, mengatasi masalah-masalah yang timbul apabila sempadan polinomial bagi mengurus kata tak linear dalam kaedah penguraian Adomian (ADM), tidak memerlukan kiraan pekali Lagrange sebagai kaedah berulang Variasi (VIM) dan tidak perlu bagi membuat homotopi sebagaimana dalam kaedah gangguan Homotopi (HPM), atau mana-mana anggapan bagi mengurus kata tak linear. Penyelesaian yang didapati dalam bentuk urutan berulang di mana ianya boleh digunakan bagi mencapai penyelesaian tepat atau hampiran. Juga, teorem titik tetap dibentangkan bagi menaksir kaedah bentuk hampiran. Pelbagai contoh seperti masalah 1D, 2D dan 3D diselesaikan samada secara analitik atau numerik, di mana kecekapan penyelesaian numerik telah ditentu sahkan dengan menilai ralat mutlak dan baki ralat maksimum (MER) bagi menentukan ketepatan dan kecekapan kaedah yang dicadangkan. Dapatan kajian menunjukkan kaedah berulang yang dicadangkan adalah berkesan, boleh percaya, jimat masa dan boleh guna bagi menyelesaikan masalah dan boleh dicadangkan menyelesaikan masalah tak linear lain. Semua proses berulang dalam kerja ini menggunakan MATHEMATICA®12.
Scheduling considered being one of the most fundamental and essential bases of the project management. Several methods are used for project scheduling such as CPM, PERT and GERT. Since too many uncertainties are involved in methods for estimating the duration and cost of activities, these methods lack the capability of modeling practical projects. Although schedules can be developed for construction projects at early stage, there is always a possibility for unexpected material or technical shortages during construction stage. The objective of this research is to build a fuzzy mathematical model including time cost tradeoff and resource constraints analysis to be applied concurrently. The proposed model has been formulated using fuzzy the
... Show MoreThe educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was
... Show MoreThe research seeks to examine the ability of fifth preparatory students in solving a mathematical problem in relation to system thinking. To this end, the researcher chose (140) fifth preparatory students from four-different secondary schools in Kirkuk city for the academic year (2016-2017). Two tests were adopted to collect study data: a test of (5) items about skills in solving math problem designed by (Al-raihan, 2006); and a test of system thinking skills designed by the researcher himself consisted of (14) items. It was divided into four skills (analyzing the main system to subsystems, eliminating all inner gaps of system, identifying the inner connection of system, and reorganizing the system). The findings indicated a good ability
... Show MoreThis paper aims to propose a hybrid approach of two powerful methods, namely the differential transform and finite difference methods, to obtain the solution of the coupled Whitham-Broer-Kaup-Like equations which arises in shallow-water wave theory. The capability of the method to such problems is verified by taking different parameters and initial conditions. The numerical simulations are depicted in 2D and 3D graphs. It is shown that the used approach returns accurate solutions for this type of problems in comparison with the analytic ones.
This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss
... Show MoreIdentification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit
... Show MoreBeta Distribution
Abstract
Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions. &nb
... Show MoreThere many methods for estimation of permeability. In this Paper, permeability has been estimated by two methods. The conventional and modified methods are used to calculate flow zone indicator (FZI). The hydraulic flow unit (HU) was identified by FZI technique. This technique is effective in predicting the permeability in un-cored intervals/wells. HU is related with FZI and rock quality index (RQI). All available cores from 7 wells (Su -4, Su -5, Su -7, Su -8, Su -9, Su -12, and Su -14) were used to be database for HU classification. The plot of probability cumulative of FZI is used. The plot of core-derived probability FZI for both modified and conventional method which indicates 4 Hu (A, B, C and D) for Nahr Umr forma
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreThis research deals with a unique and innovative topic, that is the study of complaint in the Quranic text. Despite its importance, it has never been studied before, because most of the complaint 's meanings in the Quranic text is: the in explicit complaint. The mentioned complaint's expressions in different contexts overlap with other purposes, in particular call method and its peripherals like mourn , ask for help , exclamation and others.
Moreover, expressions that reveal complaint are related to the complainant's emotional and psychological status, and the complaint's context.
This research deals with the topic into two sections: The first deals with the important expression of complaint such as: iff, ouah, mooing, crying. The