This article deals with the approximate algorithm for two dimensional multi-space fractional bioheat equations (M-SFBHE). The application of the collection method will be expanding for presenting a numerical technique for solving M-SFBHE based on “shifted Jacobi-Gauss-Labatto polynomials” (SJ-GL-Ps) in the matrix form. The Caputo formula has been utilized to approximate the fractional derivative and to demonstrate its usefulness and accuracy, the proposed methodology was applied in two examples. The numerical results revealed that the used approach is very effective and gives high accuracy and good convergence.
A numerical simulation is made on the thermal lensing effect in an laser diode end-pumped Nd:YAG laser rod. Based on finite element method (FEM), the laser rod temperature distribution is calculated and the focal length is deduced for a Gaussian and super-Gaussian pump beam profiles.
At the pump power of 20W, the highest temperature located at the center of end-pumped face was 345K, and the thermal lens focal length was 81.4mm along the x-z axis.
The results indicate that the thermal lensing effect sensitively depend on the pump power, waist radius of the pump beam and the pump distribution in a laser rod geometry.
This work addressed the assignment problem (AP) based on fuzzy costs, where the objective, in this study, is to minimize the cost. A triangular, or trapezoidal, fuzzy numbers were assigned for each fuzzy cost. In addition, the assignment models were applied on linguistic variables which were initially converted to quantitative fuzzy data by using the Yager’sorankingi method. The paper results have showed that the quantitative date have a considerable effect when considered in fuzzy-mathematic models.
This paper describes the synthesis of ?- Fe2O3 nanoparticles by sol-gel route using carboxylic acid(2-hydroxy benzoic acid) as gelatin media and its photo activity for degradation of cibacron red dye . Hematite samples are synthesized at different temperatures: 400, 500, 600, 700, 800 and 900 ?C at 700 ?C the ?-Fe2O3 nanoparticles are formed with particle size 71.93 nm. The nanoparticles are characterized by XRD , SEM, AFM and FTIR . The 0.046 g /l of the catalyst sample shows high photo activity at 3x10-5M dye concentration in acidic medium at pH 3.
Indirect electrochemical oxidation of phenol and its derivatives was investigated by using MnO2 rotating cylinder electrode. Taguchi experimental design method was employed to find the best conditions for the removal efficiency of phenol and its derivatives generated during the process. Two main parameters were investigated, current density (C.D.) and electrolysis time. The removal efficiency was considered as a response for the phenol and other organics removal. An orthogonal array L16, the signal to noise (S/N) ratio, and the analysis of variance were used to test the effect of designated process factors and their levels on the performance of phenol and other organics removal efficiency. The results showed that th
... Show MoreIn this investigation, Rayleigh–Ritz method is used to calculate the natural frequencies of rectangular isotropic and laminated symmetric and anti-symmetric cross and angle ply composite plate with general elastic supports along its edges. Each of the admissible functions here is composed of a trigonometric function and an arbitrary continuous function that is introduced to ensure the sufficient smoothness of the so-called residual displacement function at the edges. Perhaps more importantly, this study has developed a general approach for deriving a complete set of admissible functions that can be applied to various boundary conditions. Several numerical examples are studied to demonstrate the accuracy and convergence of the current s
... Show MoreMutans streptococci (MS) are a group of oral bacteria considered as the main cariogenic organisms. MS consists of several species of genus Streptococcus which are sharing similar phenotypes and genotypes. The aim of this study is to determine the genetic diversity of the core species of clinical strains of Streptococcus mutans, Streptococcus sobrinus and Streptococcus downei by using repitative extragenic palindromic (REP) primer. The DNA of the clinical strains of S. mutans (n=10), S. sobrinus (n=05) and S. downei (n=04) have been employed in the present study, which have been previously isolated from caries active subjects. The DNA of the clinical and reference strains was
... Show MoreTransient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of
... Show MoreAbstract
Theoretical and experimental methodologies were assessed to test curved beam made of layered composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the