In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynamics of our proposed model.
A new technique to study the telegraph equation, mostly familiar as damped wave equation is introduced in this study. This phenomenon is mostly rising in electromagnetic influences and production of electric signals. The proposed technique called as He-Fractional Laplace technique with help of Homotopy perturbation is utilized to found the exact and nearly approximated results of differential model and numerical example of telegraph equation or damped wave equation in this article. The most unique term of this technique is that, there is no worry to find the next iteration by integration in recurrence relation. As fractional Laplace integral transformation has some limitations in non-linear terms, to get the result of nonlinear term in
... Show MoreThe idea of the paper is to consolidate Mahgoub transform and variational iteration method (MTVIM) to solve fractional delay differential equations (FDDEs). The fractional derivative was in Caputo sense. The convergences of approximate solutions to exact solution were quick. The MTVIM is characterized by ease of application in various problems and is capable of simplifying the size of computational operations. Several non-linear (FDDEs) were analytically solved as illustrative examples and the results were compared numerically. The results for accentuating the efficiency, performance, and activity of suggested method were shown by comparisons with Adomian Decomposition Method (ADM), Laplace Adomian Decompos
... Show MoreIn this article, the solvability of some proposal types of the multi-fractional integro-partial differential system has been discussed in details by using the concept of abstract Cauchy problem and certain semigroup operators and some necessary and sufficient conditions.
This paper is concerned with the controllability of a nonlinear impulsive fractional integro-differential nonlocal control system with state-dependent delay in a Banach space. At first, we introduce a mild solution for the control system by using fractional calculus and probability density function. Under sufficient conditions, the results are obtained by means of semigroup theory and the Krasnoselskii fixed point theorem. Finally, an example is given to illustrate the main results.
Background and Objective: Public demand for procedures to rejuvenate photodamaged facial skin have stimulated the use of fractional CO2 laser as a precise and predictable treatment modality. The purpose of this study was to assess the effect of fractional CO2 laser system for reducing periorbital rhytids.
Materials and Methods: twenty seven subjects with mild periocular wrinkles, and photoaged skin of the face were prospectively treated two to three times (according to clinical response) in the periorbital area with a fractional CO2 laser device equipped with a scanning hand piece. Improvements in eyelid wrinkles was evaluated clinically and photographically. Subjects also scored satisfaction and
... Show MoreThis paper aims to study the fractional differential systems arising in warm plasma, which exhibits traveling wave-type solutions. Time-fractional Korteweg-De Vries (KdV) and time-fractional Kawahara equations are used to analyze cold collision-free plasma, which exhibits magnet-acoustic waves and shock wave formation respectively. The decomposition method is used to solve the proposed equations. Also, the convergence and uniqueness of the obtained solution are discussed. To illuminate the effectiveness of the presented method, the solutions of these equations are obtained and compared with the exact solution. Furthermore, solutions are obtained for different values of time-fractional order and represented graphically.
Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitivity to elucidate such images gets reduced with the increase of number of cases, especially when only some slices contain information of the affected area. Therefore, an automated system for the analysis and classification of MR images is mandatory. In this paper, we propose a new method for abnormality detection from T1-Weighted MRI of human head scans using three planes, including axial plane, co
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show MoreA total of 352 freshwater fishes, belonging to three species of the family Cyprinidae were collected from the Greater Zab river in north of Iraq during the period from November 2000 to the end of November 2001. The inspection of their gills revealed the infection of these fishes with three species of monogenetic trematodes belonging to the genus Dogielius. These species included D. mokhayeri from Aspius vorax with a percentage incidence of 37.5%; D. molnari from Cyprinion macrostomum (33.3%) and D. persicus from Barbus luteus (41.2%). The record of this genus and its three above-named species of the present study are considered as the first record on fishes of Iraq.