In this work, Elzaki transform (ET) introduced by Tarig Elzaki is applied to solve linear Volterra fractional integro-differential equations (LVFIDE). The fractional derivative is considered in the Riemman-Liouville sense. The procedure is based on the application of (ET) to (LVFIDE) and using properties of (ET) and its inverse. Finally, some examples are solved to show that this is computationally efficient and accurate.
Science, technology and many other fields are use clustering algorithm widely for many applications, this paper presents a new hybrid algorithm called KDBSCAN that work on improving k-mean algorithm and solve two of its
problems, the first problem is number of cluster, when it`s must be entered by user, this problem solved by using DBSCAN algorithm for estimating number of cluster, and the second problem is randomly initial centroid problem that has been dealt with by choosing the centroid in steady method and removing randomly choosing for a better results, this work used DUC 2002 dataset to obtain the results of KDBSCAN algorithm, it`s work in many application fields such as electronics libraries,
Steganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
In this paper, we studied the effect of magnetic hydrodynamic (MHD) on accelerated flows of a viscoelastic fluid with the fractional Burgers’ model. The velocity field of the flow is described by a fractional partial differential equation of fractional order by using Fourier sine transform and Laplace transform, an exact solutions for the velocity distribution are obtained for the following two problems: flow induced by constantly accelerating plate, and flow induced by variable accelerated plate. These solutions, presented under integral and series forms in terms of the generalized Mittag-Leffler function, are presented as the sum of two terms. The first term, represent the velocity field corresponding to a Newtonian fluid, and the se
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
In this paper, the dynamical behavior of a three-dimensional fractional-order prey-predator model is investigated with Holling type III functional response and constant rate harvesting. It is assumed that the middle predator species consumes only the prey species, and the top predator species consumes only the middle predator species. We also prove the boundedness, the non-negativity, the uniqueness, and the existence of the solutions of the proposed model. Then, all possible equilibria are determined, and the dynamical behaviors of the proposed model around the equilibrium points are investigated. Finally, numerical simulations results are presented to confirm the theoretical results and to give a better understanding of the dynami
... Show MoreBackground and Objective: Public demand for procedures to rejuvenate photodamaged facial skin have stimulated the use of fractional CO2 laser as a precise and predictable treatment modality. The purpose of this study was to assess the effect of fractional CO2 laser system for reducing periorbital rhytids.
Materials and Methods: twenty seven subjects with mild periocular wrinkles, and photoaged skin of the face were prospectively treated two to three times (according to clinical response) in the periorbital area with a fractional CO2 laser device equipped with a scanning hand piece. Improvements in eyelid wrinkles was evaluated clinically and photographically. Subjects also scored satisfaction and
... Show MoreIn order to get better understanding of asphalt pavement performance, asphalt from five Iraqi refineries (Qayarah, Nassiriyah, Baiji, Samawah and Daurah) were analyzed into five chemical fractions including asphaltenes, polar compounds, first acidaffins, second acidaffins and saturated hydrocarbons where the last four fractions called maltenes. Polar compounds /saturated hydrocarbons ratio (PC/S) and the ratio of the reactive to the unreactive components of the maltenes fraction (durability rating) parameters were determined. The study showed that Baiji asphalt has the best durability over other asphalts, while Qayarah asphalt is considered to have the least durability grade. These results confirm the correlation of the chemical composit
... Show More