This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonlinear initial and boundary value problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the proposed methods has been presented. Furthermore, the maximum error remainder () has been computed to prove the proposed methods' accuracy. The results convincingly prove that ECM and I-ECMs are effective and accurate in obtaining novel approximate solutions to the problems.
Densities ρ and viscosities η for several concentrations of amino acids (Serine, Cysteine and Threonine) at different temperatures (298.15, 303.15 and 308.15K) have been measured. On the basis of these data, the apparent molal volumes v , partial molal volumes at infinite dilution v , slope Sv , Gibbs free energy of activation for viscous flow of solution ∆G1,2 and Jones – Dole Bcoefficients were calculated the nature of solute-solvent and solute-solute interactions have been discussed in terms of the values of v , v , Sv and B-coefficents
Praise be to God, who created people from one soul, and made her husband, and prayers and peace be upon His Messenger, Mercy given and the grace given, and on a machine and companions pure. Divorce cases have increased in recent years in a worrying manner, especially since divorce has unforeseen consequences at the individual and social levels. The source of concern stems from the fact that the cohesion and integrity of society starts from a family as it is the cornerstone of the social structure, which is the foundation upon which the large society is based. Marital life may suffer from problems and obstacles that are difficult to solve, so the man presents the divorce of his wife and that the phenomenon of divorce is not a result of it, b
... Show MoreIn his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ
This abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe internet of medical things (IoMT), which is expected the lead to the biggest technology in worldwide distribution. Using 5th generation (5G) transmission, market possibilities and hazards related to IoMT are improved and detected. This framework describes a strategy for proactively addressing worries and offering a forum to promote development, alter attitudes and maintain people's confidence in the broader healthcare system without compromising security. It is combined with a data offloading system to speed up the transmission of medical data and improved the quality of service (QoS). As a result of this development, we suggested the enriched energy efficient fuzzy (EEEF) data offloading technique to enhance the delivery of dat
... Show More