The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of fractional differential equations.
Abstract
This study investigated the optimization of wear behavior of AISI 4340 steel based on the Taguchi method under various testing conditions. In this paper, a neural network and the Taguchi design method have been implemented for minimizing the wear rate in 4340 steel. A back-propagation neural network (BPNN) was developed to predict the wear rate. In the development of a predictive model, wear parameters like sliding speed, applying load and sliding distance were considered as the input model variables of the AISI 4340 steel. An analysis of variance (ANOVA) was used to determine the significant parameter affecting the wear rate. Finally, the Taguchi approach was applied to determine
... Show MoreThis paper describes the synthesis of ?- Fe2O3 nanoparticles by sol-gel route using carboxylic acid(2-hydroxy benzoic acid) as gelatin media and its photo activity for degradation of cibacron red dye . Hematite samples are synthesized at different temperatures: 400, 500, 600, 700, 800 and 900 ?C at 700 ?C the ?-Fe2O3 nanoparticles are formed with particle size 71.93 nm. The nanoparticles are characterized by XRD , SEM, AFM and FTIR . The 0.046 g /l of the catalyst sample shows high photo activity at 3x10-5M dye concentration in acidic medium at pH 3.
In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.
The measurements of major and trace elements in different brands of milk powder selected from the Iraqis market via the X-ray fluorescence (XRF) Technique have been studied in the present work. The result of the measurements reveals the high concentrations of sodium, phosphorus, sulfur, chlorine, potassium, calcium and magnesium. Furthermore, low concentrations of aluminum, silicon, iron, bromine, molybdenum, iodine, barium, titanium, manganese, cobalt, chrome, nickel, copper, zinc and lead were detected. Neutron activation analysis (NAA) and Kjeldahl technique were also employed to determine the concentrations of nitrogen. It was found that the nitrogen concentration was in the range of (1.96 - 3.23) % which is within the permissible li
... Show MoreThe inhibitive action of polyvinyl alcohol –sodium nitrite (PVASN) composite on the corrosion of mild steel in simulated cooling water (SCW) has been investigated by weight loss and potentiodynamic polarization. The effect of composite concentration (PVA/SN) , pH, and exposure time on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in (SCW) with pH between 6 and 8 and in absence and presence of (PVA) in solution containing different concentration of NaNO2. It was verified that all three main variables studied were statistically significant while their interaction is
... Show MoreIn this work, studying the effect of ethylenediamine as a corrosion inhibitor was investigated for carbon steel in aerated HCl solution in range of 0.1-1N under dynamic conditions, i.e., rotational velocity of 400–1200 rpm in the temperature range 35 – 65 ºC. Weight loss method was employed in absence and presence of the inhibitor as an adsorption type in concentration range 1000 – 5000 ppm using rotating cylinder specimens. The experimental results showed that corrosion rate in absence and presence of inhibitor is increased with increasing temperature, rotational velocity and concentration of acid. It is decreased with increasing inhibitor concentration for the whole range of temperature, rotational velocity and concentrati
... Show MoreThis study discussed the effects of doping with silver (Ag) on the optical and structural properties of
CdO nanoparticles at different concentrations 0, 1, 2, 3, 4, 5 wt% prepared by the precipitation method. The
materials were annealed at 550˚C for 1 h. The structural, topographical, and optical properties were
diagnosed by X-ray diffraction analysis, atomic force instrument, and visible and ultraviolet spectrometers.
The results show that the average diameter of the grains depends on the percentage of added silver to the
material, as the diameter decreased from 88.8 to 59.7 nm, and it was found that the roughness increased from
5.56 to 26.5. When studying the optical properties, it was noted that th
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show More