This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.
The main object of this article is to study and introduce a subclass of meromorphic univalent functions with fixed second positive defined by q-differed operator. Coefficient bounds, distortion and Growth theorems, and various are the obtained results.
In this research paper, we explain the use of the convexity and the starlikness properties of a given function to generate special properties of differential subordination and superordination functions in the classes of analytic functions that have the form in the unit disk. We also show the significant of these properties to derive sandwich results when the Srivastava- Attiya operator is used.
Franck-Condon factors (FCF), which are proportional to peak intensities, were calculated as the square of the overlap between the initial and final state wavefunctions in order to calculate of molecule Be9Cl35 their overlap using numerical Integration for the vibrational band (′v =0 - 4) to (v″=0 –4) of the electronic transition A 2Π - Χ 2 Σ and by using an appropriate Potential for each of them .for vibrational ground and first excited states.this new vibrational level must be instantaneously compatible with the nuclear positions and momenta of the vibrational level of the molecule in the originating electronic state. In the semiclassical picture of vibrations (oscillations) of a simple harmonic oscillator, the necessary condit
... Show MoreDirectional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a sin
... Show MoreIn this work, we introduce a new convergence formula. We also define cluster point , δ-Cauchy sequence, δ-convergent, δ-completeness , and define sequentially contraction in approach space. In addition, we prove the contraction condition is necessary and sufficient to get the function is sequentially contraction as well as we put a new structure for the norm in the approach space which is called approach –Banach space, we discuss the normed approach space with uniform condition is a Hausdorff space. Also, we prove a normed approach space is complete if and only if the metric generated from approach space is complete as well as prove every finite –dimensional approach normed space is δ-complete. We prove several r
... Show MoreThe efficiency of internal combustion engines (ICE) is usually about thirty percent of the total energy of the fuel. The residual energy is lost in the exhaust gas, the lubrication, and the cooling water in the radiators. Recently much of the researcher’s efforts have focused on taking advantage of wasted energy of the exhaust gas. Using a thermoelectric generator (TEG) is one of the promising ways. However, TEG depends entirely on the temperature difference, which may be offered by the exhaust muffler. An experimental test has been conducted to study the thermal performance of a different muffler internal design. The researchers resort to the use of lost energy in an ICE using TEG, which is one of the ways to take adv
... Show MoreIn this paper, a modified derivation has been introduced to analyze the construction of C-space. The profit from using C-space is to make the process of path planning more safety and easer. After getting the C-space construction and map for two-link planar robot arm, which include all the possible situations of collision between robot parts and obstacle(s), the A* algorithm, which is usually used to find a heuristic path on Cartesian W-space, has been used to find a heuristic path on C-space map. Several modifications are needed to apply the methodology for a manipulator with degrees of freedom more than two. The results of C-space map, which are derived by the modified analysis, prove the accuracy of the overall C-space mapping and cons
... Show MoreFuzzy C-means (FCM) is a clustering method used for collecting similar data elements within the group according to specific measurements. Tabu is a heuristic algorithm. In this paper, Probabilistic Tabu Search for FCM implemented to find a global clustering based on the minimum value of the Fuzzy objective function. The experiments designed for different networks, and cluster’s number the results show the best performance based on the comparison that is done between the values of the objective function in the case of using standard FCM and Tabu-FCM, for the average of ten runs.