In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
This paper investigates an effective computational method (ECM) based on the standard polynomials used to solve some nonlinear initial and boundary value problems appeared in engineering and applied sciences. Moreover, the effective computational methods in this paper were improved by suitable orthogonal base functions, especially the Chebyshev, Bernoulli, and Laguerre polynomials, to obtain novel approximate solutions for some nonlinear problems. These base functions enable the nonlinear problem to be effectively converted into a nonlinear algebraic system of equations, which are then solved using Mathematica®12. The improved effective computational methods (I-ECMs) have been implemented to solve three applications involving nonli
... Show MoreThe process of controlling a Flexible Joint Robot Manipulator (FJRM) requires additional sensors for measuring the state variables of flexible joints. Therefore, taking the elasticity into account adds a lot of complexity as all the additional sensors must be taken into account during the control process. This paper proposes a nonlinear observer that controls FJRM, without requiring equipment sensors for measuring the states. The nonlinear state equations are derived in detail for the FJRM where nonlinearity, of order three, is considered. The Takagi–Sugeno Fuzzy Model (T-SFM) technique is applied to linearize the FJRM system. The Luenberger observer is designed to estimate the unmeasured states using error correction. The develop
... Show MoreIn this paper, first and second order sliding mode controllers are designed for a single link robotic arm actuated by two Pneumatic Artificial Muscles (PAMs). A new mathematical model for the arm has been developed based on the model of large scale pneumatic muscle actuator model. Uncertainty in parameters has been presented and tested for the two controllers. The simulation results of the second-order sliding mode controller proves to have a low tracking error and chattering effect as compared to the first order one. The verification has been done by using MATLAB and Simulink software.
Nonlinear diffraction patterns can be obtained by focusing a laser beam through a thin slice of the material. Here, we investigated experimentally the formation of the far field nonlinear diffraction patterns of cw laser beam at 532 nm passing through a quartz cuvette containing multi-wall carbon nanotubes (MWCNT's) suspended in acetone and in DI water at concentrations of 0.030.wt.%, 0.045 wt.%, 0.060 wt.%, and 0.075 wt.%. Our results show that increasing the concentration of both types of suspensions (MWCNTs in acetone and MWCNTs DI water) led to increase in the number of pattern rings which indicates an increase in their nonlinear refractive indices. Moreover, MWCNTs DI water suspension at a concentration of 0.075 wt. % was more effic
... Show MoreAn experimental investigation of natural convection heat transfer from an isothermal horizontal,vertical and inclined heated square flat plates with and without circular hole, were carried out in two cases, perforated plates without an impermeable adiabatic hole "open core" and perforated plates with an impermeable adiabatic hole "closed core" by adiabatic plug. The experiments covered the laminar region with a range of Rayleih number of (1.11x106 ≤RaLo≤4.39x106 ), at Prandtle number (Pr=0.7). Practical experiments have been done with variable inclination angles from horizon (Ф=0o ,45o,90o,135oand 180o),facing upward (0o≤Ф<90o), and downward (90o
≤Ф<180o). The results showed that the temperature gradient increases whi
Recently, the financial mathematics has been emerged to interpret and predict the underlying mechanism that generates an incident of concern. A system of differential equations can reveal a dynamical development of financial mechanism across time. Multivariate wiener process represents the stochastic term in a system of stochastic differential equations (SDE). The standard wiener process follows a Markov chain, and hence it is a martingale (kind of Markov chain), which is a good integrator. Though, the fractional Wiener process does not follow a Markov chain, hence it is not a good integrator. This problem will produce an Arbitrage (non-equilibrium in the market) in the predicted series. It is undesired property that leads to erroneous conc
... Show MoreFlexible molecular docking is a computational method of structure-based drug design to evaluate binding interactions between receptor and ligand and identify the ligand conformation within the receptor pocket. Currently, various molecular docking programs are extensively applied; therefore, realizing accuracy and performance of the various docking programs could have a significant value. In this comparative study, the performance and accuracy of three widely used non-commercial docking software (AutoDock Vina, 1-Click Docking, and UCSF DOCK) was evaluated through investigations of the predicted binding affinity and binding conformation of the same set of small molecules (HIV-1 protease inhibitors) and a protein target HIV-1 protease enzy
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More