scispace - formally typeset
Search or ask a question
Institution

Adama University

EducationNazrēt, Ethiopia
About: Adama University is a education organization based out in Nazrēt, Ethiopia. It is known for research contribution in the topics: Population & Adsorption. The organization has 840 authors who have published 1010 publications receiving 5547 citations. The organization is also known as: Adama Science and Technology University & ቴክኖሎጂ ዩኒቨርሲቲ, አዳማ ሳይንስና ቴክኖሎጂ ዩኒቨርሲቲ.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors developed one point, five hybrid points, block method using the method of collocation and interpolation of the power series approximate solution to develop a linear multistep method with a constant step-length which was implemented in block method.
Abstract: In this paper, we develop one point, five hybrid points, block method using the method of collocation and interpolation of the power series approximate solution to develop a linear multistep method with a constant step-length which was implemented in block method. The basic properties of the derived method was investigated and found to be constant, zero stable and convergent. The region of absolute stability was equally investigated. The derived method was tested on some numerical examples.

3 citations

Journal ArticleDOI
01 Jul 2021
TL;DR: A systematic review of the neuro-fuzzy system (NFS) approach to diagnose neurological disorders, and to identify the most effective NFS approach to guide clinical practice is presented in this article.
Abstract: Neurological disorders are highly prevalent worldwide, and contributes greatly to global disease problems. This paper aimed to; presents a systematic review of the neuro-fuzzy system (NFS) approach to diagnose neurological disorders, and to identify the most effective NFS approach to guide clinical practice. A systematic search was conducted on some selected scientific databases as appropriate databases for the review. The preferred reporting items for systematic reviews and meta-analyses (PRISMA) method was used as the basic method for conducting this review. The studies selected include those in which the NFS-related approaches were developed to diagnose neurological disorders, using datasets from patients. A total of 313 papers were examined for the study, 36 papers were included according to the inclusion criteria. The results showed that among all the designed NFS models, Gaussian was the most frequently used membership functions followed by triangular functions in the selected studies, and the inference method frequently used was the Sugeno method followed by the Mamdani method. The review reveals that NFS models used are effective in diagnosing neurological disorders. However, despite the effectiveness of this approach, its usage did not cover all the neurological domains of disease diagnosis.

3 citations

Book ChapterDOI
01 Jan 2019
TL;DR: In this paper, the direct segregated boundary-domain integral equations (BDIEs) for the mixed boundary value problem for a second order elliptic partial differential equation with variable coefficient in 2D are considered.
Abstract: The direct segregated boundary-domain integral equations (BDIEs) for the mixed boundary value problem for a second order elliptic partial differential equation with variable coefficient in 2D is considered in this paper. An appropriate parametrix (Levi function) is used to reduce this BVP to the BDIEs. Although the theory of BDIEs in 3D is well developed, the BDIEs in 2D need a special consideration due to their different equivalence properties. As a result, we need to set conditions on the domain or on the associated Sobolev spaces to insure the invertibility of corresponding parametrix-based integral layer potentials and hence the unique solvability of BDIEs. The properties of corresponding potential operators are investigated. The equivalence of the original BVP and the obtained BDIEs is analysed.

3 citations

DOI
01 Sep 2021
TL;DR: In this paper, singularly perturbed boundary value problem is solved using an exponentially fitted tension spline method, and the stability and uniform convergence of the scheme are discussed and proved.
Abstract: In this article, singularly perturbed differential difference equations having delay and advance in the reaction terms are considered. The highest-order derivative term of the equation is multiplied by a perturbation parameter e taking arbitrary values in the interval (0, 1]. For the small value of e, the solution of the equation exhibits a boundary layer on the left or right side of the domain depending on the sign of the convective term. The terms with the shifts are approximated by using the Taylor series approximation.The resulting singularly perturbed boundary value problem is solved using an exponentially fitted tension spline method. The stability and uniform convergence of the scheme are discussed and proved. Numerical exam ples are considered for validating the theoretical analysis of the scheme. The developed scheme gives an accurate result with linear order uniform convergence.

3 citations

Proceedings ArticleDOI
01 Feb 2017
TL;DR: This paper strives to offer leading research opportunities and challenges in security services in adoption of cloud Computing with big data applications and also with solutions, which can help the stakeholders to better use of cloud computing services.
Abstract: Currently, various organizations, industries, business relishes the greater values of big data applications. This paper emphasis the security issues in cloud computing that are associated with big data. IT societies were progressed due to the involvement of cloud computing in a prominent manner. Cloud computing with big data application is more beneficial and plays a vital role in all support services to end users. Moreover, Cloud computing is an open environment, offers all services over the internet, but still ambiguity persists regarding the insecurity and unauthorization to end users. In this regard, the cloud computing can be enhanced with proper techniques and methodologies to secure data with its effective stores and to provide confidentiality. This paper strives to offer leading research opportunities and challenges in security services in adoption of cloud computing with big data applications and also with solutions, which can help the stakeholders to better use of cloud computing services.

3 citations


Authors

Showing all 856 results

NameH-indexPapersCitations
Delfim F. M. Torres6070114369
Trilok Singh5437310286
Dattatray J. Late4620511647
Jung Ho Je403286264
Gobena Ameni372074732
Jong Heo372555289
Mahendra A. More362684871
Gyanendra Singh322483198
Dilip S. Joag301273014
Tesfaye Biftu281293225
Salmah Ismail22792151
Rabab Mohammed21921785
Mooha Lee1649821
T. Ganesh1526735
Pandi Anandakumar1518777
Network Information
Related Institutions (5)
Addis Ababa University
10.2K papers, 264.8K citations

82% related

Council of Scientific and Industrial Research
31.8K papers, 707.7K citations

82% related

VIT University
24.4K papers, 261.8K citations

80% related

University of Johannesburg
22.7K papers, 329.4K citations

80% related

Savitribai Phule Pune University
10.6K papers, 216K citations

80% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20239
202226
2021332
2020203
2019125
2018101