In this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum error remainder ( ) has been calculated to exhibit the reliability of the suggested methods. The results persuasively prove that ECM and D-ECM are accurate, effective, and reliable in getting approximate solutions to the problem.
A three-stage learning algorithm for deep multilayer perceptron (DMLP) with effective weight initialisation based on sparse auto-encoder is proposed in this paper, which aims to overcome difficulties in training deep neural networks with limited training data in high-dimensional feature space. At the first stage, unsupervised learning is adopted using sparse auto-encoder to obtain the initial weights of the feature extraction layers of the DMLP. At the second stage, error back-propagation is used to train the DMLP by fixing the weights obtained at the first stage for its feature extraction layers. At the third stage, all the weights of the DMLP obtained at the second stage are refined by error back-propagation. Network structures an
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreConstructed wetlands (CWs) are simple low-cost wastewater treatment units that use natural process to improve the effluent water quality and make it possible for its reuse.in this study used the horizontal flow system for the tertiary treatment of wastewater effluent from secondary basins at Al-Rustamiya wastewater treatment plant / old project / Baghdad / Iraq. the Phragmites Australis plant was used for wastewater treatment and the horizontal subsurface flow system was applied. the experimental study was carried out in February 2020 to October 2020. the parameters were monitored for a period of five weeks, Concentration-based average removal efficiencies for HSSF-CW were COD,53% [NO
Because of their Physico‐chemical characteristics and its composition, the development of new specific analytical methodologies to determine some highly polar pesticides are required. The reported methods demand long analysis time, expensive instruments and prior extraction of pesticide for detection. The current work presents a new flow injection analysis method combined with indirect photometric detection for the determination of Fosetyl‐Aluminum (Fosetyl‐Al) in commercial formulations, with rapid and highly accurate determination involving only construction of manifold system combined with photometric detector without need some of the pre‐treatments to the sample before the analysis such a
A newly developed analytical method was conducted for the determination of Ketotifen fumarate (KTF) in pharmaceuticals drugs via quenching of continuous fluorescence of 9(10H)-Acridone (ACD). The method was applied using flow injection system of a new homemade ISNAG fluorimeter with fluorescence measurements at ± 90◦ via 2×4 solar cell. The calibration graph was linear in the range of 1-45 mmol/L, with correlation coefficient r = 0.9762 and the limit of detection 29.785 µg/sample from the stepwise dilution for the minimum concentration in the linear dynamic ranged of the calibration graph. The method was successfully applied to the determination of Ketotifen fumarate in two different pharma
... Show MoreA new colorimetric-flow injection method has been developed and validated for the detection of Cefotaxime sodium in pharmaceutical formulations. This method stands out for its rapid and sensitive nature. The formation of a brown-colored complex between Cefotaxime sodium and the Biuret reagent in a highly alkaline environment serves as the basis for the detection. The intensity of this colored complex is measured using a custom-built Continuous Flow Injection Analyzer, enabling accurate quantification of Cefotaxime sodium. Optimization studies of the chemical and physical parameters such as dilution of Biuret reagent, effect of the medium basicity, flow rate, sample loop and others have been investigated. The calibration gra
... Show MoreIn this paper, double Sumudu and double Elzaki transforms methods are used to compute the numerical solutions for some types of fractional order partial differential equations with constant coefficients and explaining the efficiently of the method by illustrating some numerical examples that are computed by using Mathcad 15.and graphic in Matlab R2015a.
The total and individual multipole moments of magnetic electron scattering form factors in 41Ca have been investigated using a widely successful model which is the nuclear shell model configurations keeping in mind of 1f7/2 subshell as an L-S shell and Millinar, Baymann, Zamick as L-S shell (F7MBZ) to give the model space wave vector. Also, harmonic oscillator wave functions have been used as wave function of a single particle in 1f7/2 shell. Nucleus 40Ca as core closed and Core polarization effects have been used as a corrective with first order correction concept to basic computation of L-S shell and the excitement energy has been implemented with 2ћω. The
... Show MoreWith the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security. This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for
... Show MoreIn this work, the fractional damped Burger's equation (FDBE) formula = 0,