Some relations of inclusion and their properties are investigated for functions of type " -valent that involves the generalized operator of Srivastava-Attiya by using the principle of strong differential subordination.
In this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
In this paper we will study some of the properties of an operator by looking at the associated S-act of this operator, and conversely. We look at some operators, like one to one operators, onto operators. On the other hand, we look at some act theoretic concepts, like faithful acts, finitely generated acts, singular acts, separated acts, torsion free acts and noetherian acts. We try to determine what properties of T make the associated S-act has any of these properties.
In this paper we recall the definition of fuzzy length space on a fuzzy set after that we recall basic definitions and properties of fuzzy length. We define fuzzy bounded operator as an introduction to defined fuzzy length of an operator then we proved that the fuzzy length space FB ̃ ̃ consisting of all fuzzy bounded linear operators from a fuzzy length space ̃ into a fuzzy length space ̃ is fuzzy complete if ̃ is fuzzy complete. Also we proved that every finite dimensional fuzzy length space is fuzzy complete.
Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls sh
... Show MoreThis is an autosomal dominant disease. The gene STK11 on chromosome 19 has been found in proportions of patients with this condition, this consists of: A-Intestinal hamartomatosis. B-Melanosis of the oral mucous membrane and the lips.
A standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.
In this work, we give an identity that leads to establishing the operator . Also, we introduce the polynomials . In addition, we provide Operator proof for the generating function with its extension and the Rogers formula for . The generating function with its extension and the Rogers formula for the bivariate Rogers-Szegö polynomials are deduced. The Rogers formula for allows to obtain the inverse linearization formula for , which allows to deduce the inverse linearization formula for . A solution to a q-difference equation is introduced and the solution is expressed in terms of the operators . The q-difference method is used to recover an identity of the operator and the generating function for the polynomials
... Show MoreLet R be any ring with identity, and let M be a unitary left R-module. A submodule K of M is called generalized coessential submodule of N in M, if Rad( ). A module M is called generalized hollow-lifting module, if every submodule N of M with is a hollow module, has a generalized coessential submodule of N in M that is a direct summand of M. In this paper, we study some properties of this type of modules.
This paper discusses reliability of the stress-strength model. The reliability functions ð‘…1 and ð‘…2 were obtained for a component which has an independent strength and is exposed to two and three stresses, respectively. We used the generalized inverted Kumaraswamy distribution GIKD with unknown shape parameter as well as known shape and scale parameters. The parameters were estimated from the stress- strength models, while the reliabilities ð‘…1, ð‘…2 were estimated by three methods, namely the Maximum Likelihood, Least Square, and Regression.
A numerical simulation study a comparison between the three estimators by mean square error is performed. It is found that best estimator between
... Show MoreIn the present paper, the authors introduce and investigates two new subclasses and, of the class k-fold bi-univalent functions in the open unit disk. The initial coefficients for all of the functions that belong to them were determined, as well as the coefficients for functions that belong to a field determining these coefficients requires a complicated process. The bounds for the initial coefficients and are contained among the remaining results in our analysis are obtained. In addition, some specific special improver results for the related classes are provided.