A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio
... Show MoreAmong the undesirable effects of soil compaction is a measurable reduction in plant growth and crop yield. The prevailing belief is that compacted tillage pans are caused by repetitive farming practices, heavy tractors, tillage tools, and field traffic. This experiment was conducted to determine and map the hardpan layers across an agricultural field through advanced technologies of precision agriculture. These valuable techniques such as data logger, yield map, and data analysis of performance indicators were linked with accurate global positioning systems (GPS) datasets. These important technologies provided the farmers and helped them to identify and manage areas of the fields with higher compacted layers. Three ground speeds 4.3
... Show MoreIntroduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp
... Show MoreEnergy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the
... Show MoreGiven the importance of increasing economic openness transport companies’ face various issues arising at present time, this required importing different types of goods with different means of transport. Therefore, these companies pay great attention to reducing total costs of transporting commodities by using numbers means of transport methods from their sources to the destinations. The majority of private companies do not acquire the knowledge of using operations research methods, especially transport models, through which the total costs can be reduced, resulting in the importance and need to solve such a problem. This research presents a proposed method for the sum of Total Costs (Tc) of rows and columns, in order to arrive at the init
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More