The goal of this research is to solve several one-dimensional partial differential equations in linear and nonlinear forms using a powerful approximate analytical approach. Many of these equations are difficult to find the exact solutions due to their governing equations. Therefore, examining and analyzing efficient approximate analytical approaches to treat these problems are required. In this work, the homotopy analysis method (HAM) is proposed. We use convergence control parameters to optimize the approximate solution. This method relay on choosing with complete freedom an auxiliary function linear operator and initial guess to generate the series solution. Moreover, the method gives a convenient way to guarantee the convergence of series solutions via the control parameter curve graphical method to rate the convergence and obtain the best solution. Decoding and analyzing potential Korteweg-de-Vries, Benjamin, and Airy equations, followed by convergence analysis to demonstrate the applicability of the method. By using the programs Mapel and Mathematica, the obtained results are very effective, accurate, and convergent to the exact solution after a few iterations, as shown in the tables and figures of this work.
In this research, an adaptive Canny algorithm using fast Otsu multithresholding method is presented, in which fast Otsu multithresholding method is used to calculate the optimum maximum and minimum hysteresis values and used as automatic thresholding for the fourth stage of the Canny algorithm. The new adaptive Canny algorithm and the standard Canny algorithm (manual hysteresis value) was tested on standard image (Lena) and satellite image. The results approved the validity and accuracy of the new algorithm to find the images edges for personal and satellite images as pre-step for image segmentation.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi
... Show MoreBackground: The antimicrobial resistance is one of the most serious and expanding health problems world -wide in the last decades. The esbl escherichia coli. (extended – spectrum beta-lactamase e.coli) represents an important aspect of it .Objectives: To get an overview on the esbl e.coli prevalence profile in general. Also to assess the antibiotic sensitivity of esbl e. coli trying to specify the most effective antibiotics in combating this micro-organism.Methods: this study tries to focus on this problem in Iraq which through a prospective study approach by taking 35 clinical samples from various sources (urine, blood, abscess, eye ,vagina ,stool and others),and after confirming the presence of e.coli, the presence of esbl e.coli and
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreIn this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.
Abstract This study investigated the treatment of textile wastewater contaminated with Acid Black 210 dye (AB210) using zinc oxide nanoparticles (ZnO NPs) through adsorption and photocatalytic techniques. ZnO NPs were synthesized using a green synthesis process involving eucalyptus leaves as reducing and capping agents. The synthesized ZnO NPs were characterized using UV-Vis spectroscopy, SEM, EDAX, XRD, BET, Zeta potential, and FTIR techniques. The BET analysis revealed a specific surface area and total pore volume of 26.318 m2/g. SEM images confirmed the crystalline and spherical nature of the particles, with a particle size of 73.4 nm. A photoreactor was designed to facilitate the photo-degradation process. The study investigated the inf
... Show MoreThis study discussed the effects of doping with silver (Ag) on the optical and structural properties of
CdO nanoparticles at different concentrations 0, 1, 2, 3, 4, 5 wt% prepared by the precipitation method. The
materials were annealed at 550˚C for 1 h. The structural, topographical, and optical properties were
diagnosed by X-ray diffraction analysis, atomic force instrument, and visible and ultraviolet spectrometers.
The results show that the average diameter of the grains depends on the percentage of added silver to the
material, as the diameter decreased from 88.8 to 59.7 nm, and it was found that the roughness increased from
5.56 to 26.5. When studying the optical properties, it was noted that th
Four electrodes were synthesized based on molecularly imprinted polymers (MIPs). Two MIPs were prepared by using the diclofenac sodium (DFS) as the template, 2-hydroxy ethyl metha acrylate(2-HEMA) and 2-vinyl pyridine(2-VP) as monomers as well as divinyl benzene and benzoyl peroxide as cross linker and initiator respectively. The same composition used for prepared non-imprinted polymers (NIPs) but without the template (diclofenac sodium). To prepared the membranes electrodes used different plasticizers in PVC matrix such as: tris(2-ethyl hexyl) phosphate (TEHP), tri butyl phosphate (TBP), bis(2-ethyl hexyl) adipate (BEHA) and tritolyl phosphate (TTP). The characteristics studied the slop, detection limit, life time and linearity range of DF
... Show More