In this paper we shall prepare an sacrificial solution for fuzzy differential algebraic equations of fractional order (FFDAEs) based on the Adomian decomposition method (ADM) which is proposed to solve (FFDAEs) . The blurriness will appear in the boundary conditions, to be fuzzy numbers. The solution of the proposed pattern of equations is studied in the form of a convergent series with readily computable components. Several examples are resolved as clarifications, the numerical outcomes are obvious that the followed approach is simple to perform and precise when utilized to (FFDAEs).
A simple, accurate, and cost-efficient UV-Visible spectrophotometric method has been developed for the determination of naphazoline nitrate (NPZ) in pure and pharmaceutical formulations. The suggested method was based on the nucleophilic substitution reaction of NPZ with 1,2-naphthoquinone-4-sulfonate sodium salt in alkaline medium at 80°C to form an orange/red-colored product of maximum absorption (λmax) at 483 nm. The stoichiometry of the reaction was determined via Job's method and limiting logarithmic method, and the mechanism of the reaction was postulated. Under the optimal conditions of the reaction, Beerʼs law was obeyed within the concentration range 0.5–50 μg/mL, the molar absorptivity value (ε) was 5766.5 L × mol–1 × c
... Show MoreIn the current study, haemoglobin analytes dissolved in a special buffer (KH2PO4(1M), K2HPO4(1M)) with pH of 7.4 were used to record absorption spectra measurements with a range of concentrations from (10-8 to 10-9) M and an absorption peak of 440nm using Broadband Cavity Enhanced Absorption Spectroscopy (BBCEAS) which is considered a simple, low cost, and robust setup. The principle work of this technique depends on the multiple reflections between the light source, which is represented by the Light Emitting Diode 3 W, and the detector, which is represented by the Avantes spectrophotomer. The optical cavity includes two high reflectivity ≥99% dielectric mirrors (dia
... Show MoreIn this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou
... Show MoreThe research involves preparing gold nanoparticles (AuNPs) and studying the factors that influence the shape, sizes and distribution ratio of the prepared particles according to Turkevich method. These factors include (reaction temperature, initial heating, concentration of gold ions, concentration and quantity of added citrate, reaction time and order of reactant addition). Gold nanoparticles prepared were characterized by the following measurements: UV-Visible spectroscopy, X-ray diffraction and scanning electron microscopy. The average size of gold nanoparticles was formed in the range (20 -35) nm. The amount of added citrate was changed and studied. In addition, the concentration of added gold ions was changed and the calibration cur
... Show MoreThe fuzzy sets theory has been applied in many fields, such as operations research, control theory and management sciences, etc. In particular, an application of this theory in decision making problem is linear programming problems with fuzzy technological coefficients numbers, as well as studying the parametric linear programming problems in the case of changes in the objective function. In this paper presenting a new procedure which connects and makes link between fuzzy linear programming problem with fuzzy technological coefficients numbers and parametric linear programming problem with change in coefficients of the objective function, then develop a numerical example illustrates the steps of solution to this kind of problems.
Striae distensae SD or stretch mark are frequent skin lesion that cause considerable aesthetic concern. The 1064nm long pulsed Nd:YAG Laser has been used to promote an increase in dermal collagen and is known to be a Laser that has a high affinity to vascular chromphores. Also by using fractional CO2 Laser 10600nm as an effective modality in treatment of striae distensae SD. It works to stimulate fibroblast and enhance Collagen formation, which is important for newly generated skin tissue.
Objectives: This study aims to verify the efficacy of long pulsed Nd: YAG Laser (1064nm) in the treatment of immature striae distensae (SD) and the efficacy of C02 fractional Laser (10600nm) in treatment o
... Show MoreThere is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.
Earned Value Method is used in the project o
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show More