In this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.
Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr
... Show MoreIn this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
The research aimed at studying the inhibitive effect of the hot watery dry and ethanolic ginger(85%) and fragrant oil which are added in concentrates of o.o25, o.o5o and 0.1g / 100g respectively in the growth of bacteria and molds. The results of the initial chemical diagnosis showed containment of ginger roots extract on. Alkaloids, Glycosides, Flavonoids and Suponins. The highest inhibitive effect of the bacteria reached the concentrate . 0.1% of the oil extract then the concentrate 0.050% of the ethanolic hot extract follows it. While 0.1% was the least inhibitive concentrate for the hot watery extract. But the inhibitive effect of the hot oily and alcoholic extracts in the numbers of molds colonies was 0.025%, when the concentrate 0.1%
... Show MoreThe role of the public sector- Investment customizations- economic embargo - The role of the private sector - Coexistence between the public and private sectors - Ratio of growth
Background: The etiology of Systemic lupus erythematosus seems to be multifactorial including environmental as well as genetic factors. The genetic predisposition was supported by the occurrence of Systemic lupus erythematosus in more than one member of a family as well as in identical twins.
Aim of the study: To determine the human leukocyte antigen typing class I (A and B) in patients with Systemic Lupus Erythematousus disease.
Methods: Patients group consisted of 44 Iraqi Arab Muslims patients with Systemic lupus erythematosus disease who presented to Baghdad Medical City from January 2010 to January 2012 from Baghdad Province. The second control group consisted from 80 Iraqi Arab Muslims volunteers from hospital employees and t
Which children infected with physical growth retardation at childhood it will be the largest problems effecting the child and his parents together. So , at the period of early childhood, there must be a state of satisfactions of need because if they didn’t satisfied it will be very hard to be satisfied or replaced at another period because it will be busy with satisfaction of another need of new period, and even it will be satisfactions it still weak and didn’t be am efficient as the matter of if it be satisfied at the exact time Looking at physical growth and its indicators as length and weight and making a comparison with world indicators at peer age phases helps in spe
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More