In this research, a mathematical model of tumor treatment by radiotherapy is studied and a new modification for the model is proposed as well as introducing the check for the suggested modification. Also the stability of the modified model is analyzed in the last section.
Contracting cancer typically induces a state of terror among the individuals who are affected. Exploring how glucose excess, estrogen excess, and anxiety work together to affect the speed at which breast cancer cells multiply and the immune system’s response model is necessary to conceive of ways to stop the spread of cancer. This paper proposes a mathematical model to investigate the impact of psychological panic, glucose excess, and estrogen excess on the interaction of cancer and immunity. The proposed model is precisely described. The focus of the model’s dynamic analysis is to identify the potential equilibrium locations. According to the analysis, it is possible to establish four equilibrium positions. The stability analys
... Show MoreIn this study, a mathematical model for the kinetics of solute transport in liquid membrane systems (LMSs) has been formulated. This model merged the mechanisms of consecutive and reversible processes with a “semi-derived” diffusion expression, resulting in equations that describe solute concentrations in the three sections (donor, acceptor and membrane). These equations have been refined into linear forms, which are satisfying in the special conditions for simplification obtaining the important kinetic constants of the process experimentally.
Simulation of the Linguistic Fuzzy Trust Model (LFTM) over oscillating Wireless Sensor Networks (WSNs) where the goodness of the servers belonging to them could change along the time is presented in this paper, and the comparison between the outcomes achieved with LFTM model over oscillating WSNs with the outcomes obtained by applying the model over static WSNs where the servers maintaining always the same goodness, in terms of the selection percentage of trustworthy servers (the accuracy of the model) and the average path length are also presented here. Also in this paper the comparison between the LFTM and the Bio-inspired Trust and Reputation Model for Wireless Sensor Network
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreA mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.
Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreThe main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.
In this paper an attempt to provide a single degree of freedom lumped model for fluid structure interaction (FSI) dynamical analysis will be presented. The model can be used to clarify some important concept in the FSI dynamics such as the added mass, added stiffness, added damping, wave coupling ,influence mass coefficient and critical fluid depth . The numerical results of the model show that the natural frequency decrease with the increasing of many parameters related to the structure and the fluid .It is found that the interaction phenomena can become weak or strong depending on the depth of the containing fluid .The damped and un damped free response are plotted in time domain and phase plane for different model parameters It is fou
... Show More