A new class of higher derivatives for harmonic univalent functions defined by a generalized fractional integral operator inside an open unit disk E is the aim of this paper.
In this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
The present study introduces description of a new species of genus Arboridia Zakhvaticin 1946, based on a large collection of Cicadellids. External morphological characters particularly male genitalia were discussed and illustrated. The genus Arboridia Zalchvatkiia (Typhlocybinae: Erythroneurini) contains small slender, fragil and attractively coloured and patterned leafhoppers. It was erected by Zakhvatkin in 1946 (Zalchvatkin, 1946). The overall length of adults ranges from 2.5 to 3.4 mm. Members of this genus can be recognized by inner apical cell of forewing which is long with oblique base; Cu confluent with this base at a point near the middle of the length of inner apical cell; two prominent circular deep brown spots on vertex (Zal
... Show MoreA newly developed analytical method was conducted for the determination of Ketotifen fumarate (KTF) in pharmaceuticals drugs via quenching of continuous fluorescence of 9(10H)-Acridone (ACD). The method was applied using flow injection system of a new homemade ISNAG fluorimeter with fluorescence measurements at ± 90◦ via 2×4 solar cell. The calibration graph was linear in the range of 1-45 mmol/L, with correlation coefficient r = 0.9762 and the limit of detection 29.785 µg/sample from the stepwise dilution for the minimum concentration in the linear dynamic ranged of the calibration graph. The method was successfully applied to the determination of Ketotifen fumarate in two different pharma
... Show MoreThis paper is concerned with introducing and studying the first new approximation operators using mixed degree system and second new approximation operators using mixed degree system which are the core concept in this paper. In addition, the approximations of graphs using the operators first lower and first upper are accurate then the approximations obtained by using the operators second lower and second upper sincefirst accuracy less then second accuracy. For this reason, we study in detail the properties of second lower and second upper in this paper. Furthermore, we summarize the results for the properties of approximation operators second lower and second upper when the graph G is arbitrary, serial 1, serial 2, reflexive, symmetric, tra
... Show MoreIn this research a new compounds were synthesized started from compound 1 which was synthesized from two moll of piperidine (secondary cyclic amine) with dichloro acetic acid, compound 1 reacted by condensation reaction with methanol and H 2 SO 4 as a catalyst to give the ester compound 2. Compound 2 was reacted with hydrazine hydrate 80 % to give compound 3 , then the compounds 4-13 were synthesized from refluxing of compound 3 with the selected aldehydes and ketones via using few drops of glacial acetic acid, finely step the compounds 4-13 were reacted with phtalic anhydride to give compounds 14-23.. All these compounds were characterized by using of melting point, FTIR, 1 HNMR and mass spectroscopy. Scheme 1 and Scheme 2 shown the all re
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.