The main goal of this paper is to study applications of the fractional calculus techniques for a certain subclass of multivalent analytic functions on Hilbert Space. Also, we obtain the coefficient estimates, extreme points, convex combination and hadamard product.
In this paper, author’s study sub diffusion bio heat transfer model and developed explicit finite difference scheme for time fractional sub diffusion bio heat transfer equation by using caputo fabrizio fractional derivative. Also discussed conditional stability and convergence of developed scheme. Furthermore numerical solution of time fractional sub diffusion bio heat transfer equation is obtained and it is represented graphically by Python.
The research addressed the formal functions resulting from the use of various guiding signs in the design of the interior spaces of airports in various pragmatic, expressive and psychological aspects. The aim is to identify the functions the guiding signs perform in facilitating and organizing the travelers' movement and satisfying the needs of the visitors and users of the unfamiliar places which they intend to visit, the nature of the services offered by these signs as one of the important parts within their general design. The research also identified the concept and types of signs as a means of visual communication and how to employ them in the design of the airports public spaces, and what are the criteria of their use and fu
... Show MoreThis study aims to classify the critical points of functions with 4 variables and 8 parameters, we found the caustic for the certain function with the spreading of the critical points. Finally, as an application, we found the bifurcation solutions for the equation of sixth order with boundary conditions using the Lyapunov-Schmidt method in the variational case.
The aim of this paper is adopted to give an approximate solution for advection dispersion equation of time fractional order derivative by using the Chebyshev wavelets-Galerkin Method . The Chebyshev wavelet and Galerkin method properties are presented. This technique is used to convert the problem into the solution of linear algebraic equations. The fractional derivatives are described based on the Caputo sense. Illustrative examples are included to demonstrate the validity and applicability of the proposed technique.
The analysis of COVID-19 data in Iraq is carried out. Data includes daily cases and deaths since the outbreak of the pandemic in Iraq on February 2020 until the 28th of June 2022. This is done by fitting some distributions to the data in order to find out the most appropriate distribution fit to both daily cases and deaths due to the COVID-19 pandemic. The statistical analysis includes estimation of the parameters, the goodness of fit tests and illustrative probability plots. It was found that the generalized extreme value and the generalized Pareto distributions may provide a good fit for the data for both daily cases and deaths. However, they were rejected by the goodness of fit test statistics due to the high variability of the data.<
... Show MoreTrimmed Linear moments (TL-moments) are natural generalization of L-moments that do not require the mean of the underlying distribution to exist. It is known that the sample TL-moments is unbiased estimators to corresponding population TL-moment. Since different choices for the amount of trimming give different values of the estimators it is important to choose the estimator that has minimum mean squares error than others. Therefore, we derive an optimal choice for the amount of trimming from known distributions based on the minimum errors between the estimators. Moreover, we study simulation-based approach to choose an optimal amount of trimming and maximum like hood method by computing the estimators and mean squares error for range of
... Show MoreThe aim of the paper is to compute projective maximum distance separable codes, -MDS of two and three dimensions with certain lengths and Hamming weight distribution from the arcs in the projective line and plane over the finite field of order twenty-five. Also, the linear codes generated by an incidence matrix of points and lines of were studied over different finite fields.
In this article four samples of HgBa2Ca2Cu2.4Ag0.6O8+δ were prepared and irradiated with different doses of gamma radiation 6, 8 and 10 Mrad. The effects of gamma irradiation on structure of HgBa2Ca2Cu2.4Ag0.6O8+δ samples were characterized using X-ray diffraction. It was concluded that there effect on structure by gamma irradiation. Scherrer, crystallization, and Williamson equations were applied based on the X-ray diffraction diagram and for all gamma doses, to calculate crystal size, strain, and degree of crystallinity. I
... Show MoreThe class of quasi semi -convex functions and pseudo semi -convex functions are presented in this paper by combining the class of -convex functions with the class of quasi semi -convex functions and pseudo semi -convex functions, respectively. Various non-trivial examples are introduced to illustrate the new functions and show their relationships with -convex functions recently introduced in the literature. Different general properties and characteristics of this class of functions are established. In addition, some optimality properties of generalized non-linear optimization problems are discussed. In this generalized optimization problems, we used, as the objective function, quasi semi -convex (respectively, strictly quasi semi -convex
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.