Some nonlinear differential equations with fractional order are evaluated using a novel approach, the Sumudu and Adomian Decomposition Technique (STADM). To get the results of the given model, the Sumudu transformation and iterative technique are employed. The suggested method has an advantage over alternative strategies in that it does not require additional resources or calculations. This approach works well, is easy to use, and yields good results. Besides, the solution graphs are plotted using MATLAB software. Also, the true solution of the fractional Newell-Whitehead equation is shown together with the approximate solutions of STADM. The results showed our approach is a great, reliable, and easy method to deal with specific problems in a variety of applied sciences and engineering fields
Over the last few decades the mean field approach using selfconsistent
Haretree-Fock (HF) calculations with Skyrme effective
interactions have been found very satisfactory in reproducing
nuclear properties for both stable and unstable nuclei. They are
based on effective energy-density functional, often formulated in
terms of effective density-dependent nucleon–nucleon interactions.
In the present research, the SkM, SkM*, SI, SIII, SIV, T3, SLy4,
Skxs15, Skxs20 and Skxs25 Skyrme parameterizations have been
used within HF method to investigate some static and dynamic
nuclear ground state proprieties of 84-108Mo isotopes. In particular,
the binding energy, proton, neutron, mass and charge densities
In this paper the nuclear structure of some of Si-isotopes namely, 28,32,36,40Si have been studied by calculating the static ground state properties of these isotopes such as charge, proton, neutron and mass densities together with their associated rms radii, neutron skin thicknesses, binding energies, and charge form factors. In performing these investigations, the Skyrme-Hartree-Fock method has been used with different parameterizations; SkM*, S1, S3, SkM, and SkX. The effects of these different parameterizations on the above mentioned properties of the selected isotopes have also been studied so as to specify which of these parameterizations achieves the best agreement between calculated and experimental data. It can be ded
... Show MoreThis article will introduce a new iteration method called the zenali iteration method for the approximation of fixed points. We show that our iteration process is faster than the current leading iterations like Mann, Ishikawa, oor, D- iterations, and *- iteration for new contraction mappings called quasi contraction mappings. And we proved that all these iterations (Mann, Ishikawa, oor, D- iterations and *- iteration) equivalent to approximate fixed points of quasi contraction. We support our analytic proof by a numerical example, data dependence result for contraction mappings type by employing zenali iteration also discussed.
This work used the deposition method to synthesize nickel oxide nanoparticles. The materials mainly used in this study were nickel sulfate hexahydrate (as a precursor) and NaOH (as a precipitant). The properties of the nanopowder were characterized by XRD, FE-SEM, EDX, and VSM. The obtained results confirmed the presence of nickel oxide nanoparticles with a face-centered cubic (FCC) structure with a lattice constant (a=4.17834 Å). Scherer and Williamson-Hall equations were used to calculate the crystallite size of about (30.5-35.5) nm. The FE-SEM images showed that the particle shape had a ball-like appearance with a uniform and homogeneous distribution and confirmed that the particles were within the nanoscale. The presence of oxygen a
... Show MoreThe research started from the basic objective of tracking the reality of organizational excellence in educational organizations on the basis of practical application. The research in its methodology was based on the examination of organizational excellence in the way of evaluating institutional performance. Tikrit University was selected as a case study to study the reality of application to the dimensions of organizational excellence in it, The results of the analysis for ten periods during the year and month. For the accuracy of the test and its averages, it was preferable to use the T test to determine the significance of the results compared to the basic criteria.
The research found that there is an o
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
In this study, cloud point extraction combined with molecular spectrometry as an eco-friendly method is used for extraction, enrichment and determination of bendiocarb (BC) insecticide in different complex matrices. The method involved an alkaline hydrolysis of BC followed Emerson reaction in which the resultant phenol is reacted with 4-aminoantipyrene(4-AAP) in the presence of an alkaline oxidant of potassium ferric cyanide to form red colored product which then extracted into micelles of Triton X-114 as a mediated extractant at room temperature. The extracted product in cloud point layer is separated from the aqueous layer by centrifugation for 20 min and dissolved in a minimum amount of a mixture ethanol: water (1:1) followed
... Show MoreIn this paper a modified approach have been used to find the approximate solution of ordinary delay differential equations with constant delay using the collocation method based on Bernstien polynomials.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show More