In this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.
Aluminum oxide thin films were prepared by dc reactive sputtering technique using different mixing ratios of argon and oxygen gases (90:10, 70:30, 50:50, 30:70, and 10:90). These films were characterized to introduce their crystalline structures, surface morphology, and elemental composition. A progressive transition occurs from a predominantly amorphous to a highly crystalline Al2O3 film as the oxygen content in the Ar:O2 gas mixture is increased. Increasing the oxygen content leads to a progressive decrease in surface roughness, resulting in smoother and more uniform films with finer granular features. The oxygen-rich environments yield the smoothest surfaces, while argon-rich environments result in significantly rougher surfaces. These f
... Show MoreThe current research attempts to find a feed additive that enhances fish growth and eliminate toxins generated from fungi and mold, which are found in improperly manufactured and stored feed, while ensuring the safety of these fish meat for the consumer. Therefore, the organic properties of chitosan powder were examined in order to determine its impact on maturation of young
An efficient modification and a novel technique combining the homotopy concept with Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced in this paper . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.
The 3-aminoacetophenone and 4-aminoantipyrine were used as precursors to prepare new six ligands. The three new ligands (L1,L2 and L3) were synthesis by reacting one mole of 3-aminoacetophenone with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thiocyanat in acetone as a solvent, they are:- L1 (AAA) =[N-(3-acetylphenylcarbamothioyl)acetamide] L2 (BAA) =[N-(3-acetylphenylcarbamothioyl)benzamide] L3 (MAA) =[N-(3-acetylphenylcarbamothioyl)-4-methoxy benzamide] Also three new derivatives of 4-aminoantipyrine were synthesis by reacting one mole of 4-aminoantipyrine with one mole of (Acetyl chloride), (benzoyl chloride), (4-methoxybenzoyl chloride) and ammonium thio
... Show MoreThis work introduces the synthesis and the characterization of N-doped TiO2 and Co3O4 thin films prepared via DC reactive magnetron sputtering technique. N-doped TiO2 thin films was deposited on indium-tin oxide (ITO) conducting substrate at different nitrogen ratios, then the Co3O4 thin film was deposited onto the N-doped TiO2 layer to synthesize a double-layer TiO2-N/Co3O4 Photoelectrochromic device. Several techniques were used to characterize the produces which are x-ray diffraction (XRD), field emission-scanning electron microscopy (FE-SEM), Fourier-transform infrared (FTIR) spectroscopy and UV–Vis spectroscopy. The Photoelectrochromic device was characterized by UV–Vis spectroscopy and the results show that the double-layer N-dope
... Show MoreIn this paper, the dynamic behaviour of the stage-structure prey-predator fractional-order derivative system is considered and discussed. In this model, the Crowley–Martin functional response describes the interaction between mature preys with a predator. e existence, uniqueness, non-negativity, and the boundedness of solutions are proved. All possible equilibrium points of this system are investigated. e sucient conditions of local stability of equilibrium points for the considered system are determined. Finally, numerical simulation results are carried out to conrm the theoretical results.
This research is studying technique sculptures super - realism, search through, how the method of work, and the search for the materials used in their manufacture, and this is the first study in the field of art and the field of academic study in the country.Research consists of an introduction, And four sections, The introduction containing information on: research problem, Importance of research, Goals of the research, Limits of research, research approach, and research tools.The first section contains a technical study sculptures super -realism in contemporary sculpture, while the second section includes a search for alternative materials available in the local markets, for making sculptures super - realism, the third section dedicate
... Show MoreRapid, reproducible and accurate method has been developed for the assay for of mebendazol (MBZ) residual assay. The method is based on alkaline hydrolysis of MBZ with sodium hydroxide then oxidation with N-bromosuccinimide (NBS) followed by coupling with 4-Bromoaniline (4-BA) to yield a highly colored product absorbed at maximum 434 nm. Regression analysis of linearity range was found (0.6-2.8) µg.ml-1. The optimum conditions that affect the oxidation were studied. The developed method was found to be precise with mean value of relative standard deviation (1.153- 1.303) and accurate with relative error (-0.5940-1.7821) .The calculated molar absorptivity and sandal sensitivity values of (29825 L.mol-1.cm
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show More