The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of fractional differential equations.
This research deals with a shrinking method concernes with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained v
... Show MoreThis paper presents the implementation of a complex fractional order proportional integral derivative (CPID) and a real fractional order PID (RPID) controllers. The analysis and design of both controllers were carried out in a previous work done by the author, where the design specifications were classified into easy (case 1) and hard (case 2) design specifications. The main contribution of this paper is combining CRONE approximation and linear phase CRONE approximation to implement the CPID controller. The designed controllers-RPID and CPID-are implemented to control flowing water with low pressure circuit, which is a first order plus dead time system. Simulation results demonstrate that while the implemented RPID controller fails to stabi
... Show MoreThe study included the collection of samples of raw cow milk to isolate Leuconostoc bacteria, samples were sub cultured on De-Man Rogosa Sharpe-Vancomycin medium, the pure colonies were selected and subjected to the cultural and microscopically tests, according to that 25 cocci bacterial isolates were obtained, then isolates were subjected to biochemical tests. Result of tests showed that 12 isolates belong to the genus Leuconostoc out of 25 cocci bacterial isolates, Vitek2 system was used as a supplementary step. Results of final identification showed that 3 sub species were obtained included Leuconostoc mesenteroides ssp. cremoris 9 out of 12 isolates, while it was 2 isolates of Leuconostoc mesenteroides ssp. mesenteroides and one isol
... Show MoreImage segmentation using bi-level thresholds works well for straightforward scenarios; however, dealing with complex images that contain multiple objects or colors presents considerable computational difficulties. Multi-level thresholding is crucial for these situations, but it also introduces a challenging optimization problem. This paper presents an improved Reptile Search Algorithm (RSA) that includes a Gbest operator to enhance its performance. The proposed method determines optimal threshold values for both grayscale and color images, utilizing entropy-based objective functions derived from the Otsu and Kapur techniques. Experiments were carried out on 16 benchmark images, which inclu
The fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase more
... Show MoreThe fluorescence emission of Rhodamine 6G (R6G) and Acriflavine dyes in PMMA polymer have been studied by changing the irradiation and exposure time of laser light to know the effect of this parameter. It was found that the fluorescence intensity decreases in the polymer samples doped dyes as the exposure time increases and then reaches stabilization at long times, this behavior called photobleaching, which have been shown in liquid phase less than solid phase. Using 2nd harmonic with wavelength 530 nm laser, the photobleaching effect in the two dye-doped polymers different solvent but same was studied. It was observed that photobleaching of by different solution and by using dip spin coating the photobleaching seem in liquid phase
... Show MoreAccording to the theory of regular geometric functions, the relevance of geometry to analysis is a critical feature. One of the significant tools to study operators is to utilize the convolution product. The dynamic techniques of convolution have attracted numerous complex analyses in current research. In this effort, an attempt is made by utilizing the said techniques to study a new linear complex operator connecting an incomplete beta function and a Hurwitz–Lerch zeta function of certain meromorphic functions. Furthermore, we employ a method based on the first-order differential subordination to derive new and better differential complex inequalities, namely differential subordinations.
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More