A factor group is a mathematical group obtained by aggregating similar elements of a larger group using an equivalence relation that preserves some of the group structure. In this paper, the factor groups K(SL(2,121)) and K(SL(2,169)) computed for each group from the character table of rational representations.
This paper introduces the Multistep Modified Reduced Differential Transform Method (MMRDTM). It is applied to approximate the solution for Nonlinear Schrodinger Equations (NLSEs) of power law nonlinearity. The proposed method has some advantages. An analytical approximation can be generated in a fast converging series by applying the proposed approach. On top of that, the number of computed terms is also significantly reduced. Compared to the RDTM, the nonlinear term in this method is replaced by related Adomian polynomials prior to the implementation of a multistep approach. As a consequence, only a smaller number of NLSE computed terms are required in the attained approximation. Moreover, the approximation also converges rapidly over a
... Show MoreIn this article, an efficient reliable method, which is the residual power series method (RPSM), is used in order to investigate the approximate solutions of conformable time fractional nonlinear evolution equations with conformable derivatives under initial conditions. In particular, two types of equations are considered, which are time coupled diffusion-reaction equations (CD-REs) and MKdv equations coupled with conformable fractional time derivative of order α. The attitude of RPSM and the influence of different values of α are shown graphically.
This paper is employed to discuss the effects of the magnetic field and heat transfer on the peristaltic flow of Rabinowitsch fluid through a porous medium in the cilia channel. The governing equations (mass, motion, and energy) are formulated and then the assumptions of long wavelength and low Reynold number are used for simplification. The velocity field, pressure gradient, temperature, and streamlines are obtained when the perturbation technique is applied to solve the nonlinear partial differential equations. The study shows that the velocity is decreased with increasing Hartmann number while it is decreased with increasing the porosity.
The tight gas is one of the main types of the unconventional gas. Typically the tight gas reservoirs consist of highly heterogeneous low permeability reservoir. The economic evaluation for the production from tight gas production is very challenging task because of prevailing uncertainties associated with key reservoir properties, such as porosity, permeability as well as drainage boundary. However one of the important parameters requiring in this economic evaluation is the equivalent drainage area of the well, which relates the actual volume of fluids (e.g gas) produced or withdrawn from the reservoir at a certain moment that changes with time. It is difficult to predict this equival
The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th
... Show MoreBackground: There are several diseases in the body following recovery from COVID-19 infection because this virus operates on human genes in various types of peripheral tissue in the human body. It penetrates host cells via Angiotensin-converting enzyme-2 receptors and may have effects on bone remodeling, leading to osteopenia or osteoporosis, which are characterized by low bone mineral density, resulting in diminished bone strength. Bone Alkaline Phpsphatase is an enzyme released into the bloodstream as a soluble homodimer after being cleaved by a phospholipase and can be utilized as a biomarker of bone development.
Objective: This research was designed to investigate the alteration of bone homeos
... Show MoreVisceral Leishmaniasis (VL) is a disseminated protozoan infection caused by Leishmania donovani parasites which affects almost half a million persons annually. Classical diagnosis methods of VL still not very sensitive and time consuming. In this study, we reported the success of polymerase chain reaction (PCR) method to identify L. donovani based on kinetoplast deoxyribonucleic acid (kDNA) for the diagnosis of the parasite using in vitro promastigote cultures. LdI species - specific primer was used to identify L. donovani and the result showed a single band of about ~600bp. It can be recommended that this primer is to be used for detection the visceral L. donovani.
In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show More