This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonlinear initial and boundary value problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the proposed methods has been presented. Furthermore, the maximum error remainder () has been computed to prove the proposed methods' accuracy. The results convincingly prove that ECM and I-ECMs are effective and accurate in obtaining novel approximate solutions to the problems.
Background: Rhinosinusitis is an inflammatory disorder that refers to inflammation of the nose and paranasal sinuses. Recent studies show that serum IL-33, periostin, ARGE and sST2 had the role in the pathogenesis of chronic rhinosinusitis as an easy, non-invasive and readily available (biomarker) for diagnosis of chronic rhinosinusitis. We tested for correlations of IL-33, periostin, ARGE and sST2 between acute and chronic rhinosinusitis in compare to healthy people. This study aimed to Measure serum levels of periostin, IL-33, sST2, and ARGE biomarkers in patients ARS and CRS. Materials and Methods: We collected serum of 30 patients with acute rhinosinusitis, 30 with chronic rhinosinusitis, and 30 controls to examine serum levels of IL-3
... Show MoreContemporary developments in various sciences and the impact of technological changes require an integrated vision of the activities and work of the organization in Iraq in light of the high costs of products and their low quality compared to imported products of high quality and low cost, and the need to use modern cost techniques based on a clear and specific philosophy that contributes to increasing the efficiency and effectiveness of management In the business environment and how it can contribute to reducing product costs and being environmentally friendly at the same time, it is no secret that the main goal of most organizations is to maximize profitability and reduce costs to the minimum, but this matter is not achieved autom
... Show MoreFabric design is one of the arts in which humans participate functionally and aesthetically. Researching its design aspects is an important goal, especially after taking technical developments to cover many of its fields. Modern designs emphasize the importance of preparing designs and implementing them according to the child’s ability, inclinations and desires (mental, psychological and emotional). ), as the child is the real focus of the design idea, and the designer has paid most of his attention to the requirements and needs of this stage (childhood stage) because of its importance in the life of society, as he focused his attention on implementing designs that could achieve stability and stability in the child’s psyche through s
... Show MoreDetecting protein complexes in protein-protein interaction (PPI) networks is a challenging problem in computational biology. To uncover a PPI network into a complex structure, different meta-heuristic algorithms have been proposed in the literature. Unfortunately, many of such methods, including evolutionary algorithms (EAs), are based solely on the topological information of the network rather than on biological information. Despite the effectiveness of EAs over heuristic methods, more inherent biological properties of proteins are rarely investigated and exploited in these approaches. In this paper, we proposed an EA with a new mutation operator for complex detection problems. The proposed mutation operator is formulate
... Show MoreAdolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
Abstract
The human mind knew the philosophy and logic in the ancient times, and the history afterwards, while the semiotics concept appeared in the modern time, and became a new knowledge field like the other knowledge fields. It deals, in its different concepts and references, with the processes that lead to and reveals the meaning through what is hidden in addition to what is disclosed. It is the result of human activity in its pragmatic and cognitive dimensions together. The semiotic token concept became a knowledge key to access all the study, research, and investigation fields, due to its ability of description, explanation, and dismantling. The paper is divided into two sections preceded by a the
... Show MoreBackground and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show More