In the present paper, by making use of the new generalized operator, some results of third order differential subordination and differential superordination consequence for analytic functions are obtained. Also, some sandwich-type theorems are presented.
In this paper a mathematical model that analytically as well as numerically
the flow of infection disease in a population is proposed and studied. It is
assumed that the disease divided the population into five classes: immature
susceptible individuals (S1) , mature individuals (S2 ) , infectious individual
(I ), removal individuals (R) and vaccine population (V) . The existence,
uniqueness and boundedness of the solution of the model are discussed. The
local and global stability of the model is studied. Finally the global dynamics of
the proposed model is studied numerically.
A food chain model in which the top predator growing logistically has been proposed and studied. Two types of Holling’s functional responses type IV and type II have been used in the first trophic level and second trophic level respectively, in addition to Leslie-Gower in the third level. The properties of the solution are discussed. Since the boundary dynamics are affecting the dynamical behavior of the whole dynamical system, the linearization technique is used to study the stability of the subsystem of the proposed model. The persistence conditions of the obtained subsystem of the food chain are established. Finally, the model is simulated numerically to understand the global dynamics of the food chain un
... Show MoreThe research sheds light on a new topic of international law, the most important of which is, around which there are still question marks and differences in most of its aspects, especially with regard to international liability for damage caused by cyber attacks in the virtual space, the last is the fifth area that appeared alongside other area (Land, sea, air and outer space) and in addition to being a space on which states depend in the performance of their functions and international relations, it is a new arena for war and a source of danger to the security of states, As the security exposure to the secrets of states increased due to espionage and piracy, and the attacks on the infrastructure of countries increased, and the silence o
... Show MoreThis paper is attempt to study the nonlinear second order delay multi-value problems. We want to say that the properties of such kind of problems are the same as the properties of those with out delay just more technically involved. Our results discuss several known properties, introduce some notations and definitions. We also give an approximate solution to the coined problems using the Galerkin's method.
Dates are considered one of the most important foods consumed in Arab countries. Dates are commonly infested with the sawtoothed grain beetle, Oryzaephilus surinamensis. Consequently, the date yield, quantity, and quality (economic value and seed viability) are negatively affected. This study was designed to investigate the effectiveness of air evacuation as eco-friendly and safe control method against adult O. surinamensis. Insects were obtained from the infested date purchased from a private store in sakaka city, Aljouf region, Saudi Arabia. Air evacuation (using a vacuum pump) and food deprivation were applied to O. surinamensis, and insect mortality was observed daily in comparison with the control group (a
... Show MoreEDIRKTO, an Implicit Type Runge-Kutta Method of Diagonally Embedded pairs, is a novel approach presented in the paper that may be used to solve 4th-order ordinary differential equations of the form . There are two pairs of EDIRKTO, with three stages each: EDIRKTO4(3) and EDIRKTO5(4). The derivation techniques of the method indicate that the higher-order pair is more accurate, while the lower-order pair provides superior error estimates. Next, using these pairs as a basis, we developed variable step codes and applied them to a series of -order ODE problems. The numerical outcomes demonstrated how much more effective their approach is in reducing the quantity of function evaluations needed to resolve fourth-order ODE issues.
Detecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulated und
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show More