Transformation and many other substitution methods have been used to solve non-linear differential fractional equations. In this present work, the homotopy perturbation method to solve the non-linear differential fractional equation with the help of He’s Polynomials is provided as the transformation plays an essential role in solving differential linear and non-linear equations. Here is the α-Sumudu technique to find the relevant results of the gas dynamics equation in fractional order. To calculate the non-linear fractional gas dynamical problem, a consumer method created on the new homotopy perturbation a-Sumudu transformation method (HP TM) is suggested. In the Caputo type, the derivative is evaluated. a-Sumudu homotopy perturbation technique and He’s polynomials are all incorporated in the HPSaTM. The availability of He’s polynomials could be used to conveniently manage the non-linearity. The suggested approach shows that the strategy is simple to implement and provides results that can be compared to the results gained from any other transformation technique.
We study one example of hyperbolic problems it's Initial-boundary string problem with two ends. In fact we look for the solution in weak sense in some sobolev spaces. Also we use energy technic with Galerkin's method to study some properties for our problem as existence and uniqueness
This study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The aim of this article is to present the exact analytical solution for models as system of (2+1) dimensional PDEs by using a reliable manner based on combined LA-transform with decomposition technique and the results have shown a high-precision, smooth and speed convergence to the exact solution compared with other classic methods. The suggested approach does not need any discretization of the domain or presents assumptions or neglect for a small parameter in the problem and does not need to convert the nonlinear terms into linear ones. The convergence of series solution has been shown with two illustrated examples such (2+1)D- Burger's system and (2+1)D- Boiti-Leon-Pempinelli (BLP) system.
Four electrodes were synthesized based on molecularly imprinted polymers (MIPs). Two MIPs were prepared by using the diclofenac sodium (DFS) as the template, 2-hydroxy ethyl metha acrylate(2-HEMA) and 2-vinyl pyridine(2-VP) as monomers as well as divinyl benzene and benzoyl peroxide as cross linker and initiator respectively. The same composition used for prepared non-imprinted polymers (NIPs) but without the template (diclofenac sodium). To prepared the membranes electrodes used different plasticizers in PVC matrix such as: tris(2-ethyl hexyl) phosphate (TEHP), tri butyl phosphate (TBP), bis(2-ethyl hexyl) adipate (BEHA) and tritolyl phosphate (TTP). The characteristics studied the slop, detection limit, life time and linearity range of DF
... Show MoreImage segmentation is a basic image processing technique that is primarily used for finding segments that form the entire image. These segments can be then utilized in discriminative feature extraction, image retrieval, and pattern recognition. Clustering and region growing techniques are the commonly used image segmentation methods. K-Means is a heavily used clustering technique due to its simplicity and low computational cost. However, K-Means results depend on the initial centres’ values which are selected randomly, which leads to inconsistency in the image segmentation results. In addition, the quality of the isolated regions depends on the homogeneity of the resulted segments. In this paper, an improved K-Means
... Show MoreEthnographic research is perhaps the most common applicable type of qualitative research method in psychology and medicine. In ethnography studies, the researcher immerses himself in the environment of participants to understand the cultures, challenges, motivations, and topics that arise between them by investigating the environment directly. This type of research method can last for a few days to a few years because it involves in-depth monitoring and data collection based on these foundations. For this reason, the findings of the current study stimuli the researchers in psychology and medicine to conduct studies by applying ethnographic research method to investigate the common cultural patterns language, thinking, beliefs, and behavior
... Show MoreMango fruit is one of the most nutritionally rich fruits with unique flavor, this fruit belonged to family of Anacardiaceae and it is an excellent source of vitamins specially vitamin A, carotene pigments and potassium. In this study the antimicrobial activity of mango seeds extract has been investigated against gram positive bacteria (Staphylococcus aureus and Bacillus spp.) and gram negative bacteria (Pseudomonas aeruginosa and E. coli) and yeast Candida albicans by well diffusion method in nutrient agar and the results were expressed as the diameter of bacterial inhibition zones surrounding the wells, and the antibiofilm of its extracts was observed against Staphylococcus aureus. The seeds extractions prepared by two solvents: 85% eth
... Show MoreIn this paper, the bi-criteria machine scheduling problems (BMSP) are solved, where the discussed problem is represented by the sum of completion and the sum of late work times simultaneously. In order to solve the suggested BMSP, some metaheurisitc methods are suggested which produce good results. The suggested local search methods are simulated annulling and bees algorithm. The results of the new metaheurisitc methods are compared with the complete enumeration method, which is considered an exact method, then compared results of the heuristics with each other to obtain the most efficient method.
This article aims to introducenumerical study of two different incompressible Newtonian fluid flows. The first type of flow is through the straight channel, while the second flow is enclosed within a square cavity and the fluid is moved by the upper plate at a specific velocity. Numerically, a Taylor-Galerkin\ pressure-correction finite element method (TGPCFEM) is chosen to address the relevant governing equations. The Naiver-Stoke partial differential equations are usually used to describe the activity of fluids. These equations consist of the continuity equation (conservation of mass) and the time-dependent conservation of momentum, which are preserved in Cartesian coordinates. In this study, the effect of Reynolds number (
... Show More