This study aims to classify the critical points of functions with 4 variables and 8 parameters, we found the caustic for the certain function with the spreading of the critical points. Finally, as an application, we found the bifurcation solutions for the equation of sixth order with boundary conditions using the Lyapunov-Schmidt method in the variational case.
charge transfer complex formed by interaction between the p- aminodiphenylamine (PADPA) as electron donor with iodine as electron acceptor in ethanol at 250C as evidenced by color change and absorption. The spectrum obtained from complex PADPA – Iodine shows absorptions bands at 586 nm. All the variables which affected on the stability of complex were studies such as temperature, pH, time and concentration of acceptor. The linearity of the method was observed within a concentration rang (10–165) mg.L-1 and with a correlation coefficient (0.9996), while the molar absorbitivity and sandell sensitivity were (4643.32) L.mol-1.cm-1 and (0.0943) μg.cm-2, respectively. The adsorption of complex PADPA–I2 was studied using adsorbent surfaces
... Show MoreIn this paper, the process for finding an approximate solution of nonlinear three-dimensional (3D) Volterra type integral operator equation (N3D-VIOE) in R3 is introduced. The modelling of the majorant function (MF) with the modified Newton method (MNM) is employed to convert N3D-VIOE to the linear 3D Volterra type integral operator equation (L3D-VIOE). The method of trapezoidal rule (TR) and collocation points are utilized to determine the approximate solution of L3D-VIOE by dealing with the linear form of the algebraic system. The existence of the approximate solution and its uniqueness are proved, and illustrative examples are provided to show the accuracy and efficiency of the model.
Mathematical Subject Classificat
... Show MoreIt is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul
... Show MoreIt is proposed and studied a prey-predator system with a Holling type II functional response that merges predation fear with a predator-dependent prey's refuge. Understanding the impact of fear and refuge on the system's dynamic behavior is one of the objectives. All conceivable steady-states are investigated for their stability. The persistence condition of the system has been established. Local bifurcation analysis is performed in the Sotomayor sense. Extensive numerical simulation with varied parameters was used to explore the system's global dynamics. A limit cycle and a point attractor are the two types of attractors in the system. It's also interesting to note that the system exhibits bi-stability between these 2 types of attractors.
... Show MoreSulfamethoxazole (SMX) was added to P-N,N-dimethyl amino benzaldehyde (PDAB) by condensation reaction in acidic medium to form, a yellow colored dye compound which exhibits maximum absorption (λmax) at 450.5 nm. The concentration of (SMX) was determined spectrophotometrically. The optimum reaction conditions and other analytical parameters were evaluated. In addition to classical univariate optimization, design of experiment method has been applied in optimization of the variables affecting the color producing reaction. Beer’s law obeyed in the concentration range of 0.1-10 μg.mL-1 with molar absorptivity of 5.7950×104 L.mol-1.cm-1. The limit of detection and Sandell's sensitivity value were 0.078 μ
... Show More
Abstract
Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t
... Show MoreFriction Stir Welding (FSW) is one of the most effective solid states joining process and has numerous potential applications in many industries. A FSW numerical tool, based on ANSYS F.E software, has been developed. The amount of the heat gone to the tool dictates the life of the tool and the capability of the tool to produce a good processed zone. Hence, understanding the heat transfer aspect of the friction stir welding is extremely important for improving the process. Many research works were carried out to simulate the friction stir welding using various softwares to determine the temperature distribution for a given set of welding conditions. The objective of this research is to develop a finite element sim
... Show MoreIn this paper, we introduce the notions of Complete Pseudo Ideal, K-pseudo Ideal, Complete K-pseudo Ideal in pseudo Q-algebra. Also, we give some theorems and relationships among them are debated.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Let be a commutative ring with identity and let be an R-module. We call an R-submodule of as P-essential if for each nonzero prime submodule of and 0 . Also, we call an R-module as P-uniform if every non-zero submodule of is P-essential. We give some properties of P-essential and introduce many properties to P-uniform R-module. Also, we give conditions under which a submodule of a multiplication R-module becomes P-essential. Moreover, various properties of P-essential submodules are considered.