The necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
The aim of the work is synthesis and characterization of bidentate ligand [3-(3-acetylphenylamino)-5,5-dimethylcyclohex-3-enone][HL], from the reaction of dimedone with 3-amino acetophenone to produce the ligand [HL], the reaction was carried out in dry benzene as a solvent under reflux. The prepared ligand [HL] was characterized by FT-IR, UV-Vis spectroscopy, 1H, 13C-NMR spectra, Mass spectra, (C.H.N) and melting point. The mixed ligand complexes were prepared from ligand [HL] was used as a primary ligand while 8-hydroxy quinoline [HQ] was used as a secondary ligand with metal ion M(Π).Where M(Π) = (Mn ,Co ,Ni ,Cu ,Zn ,Cd and Pd) at reflux ,using ethanol as a solvent, KOH as a base. Complexes of the composition [M(L)(Q)] with (1
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreObjective(s): assessment of the health follow up and weight control for women with osteoporosis and find out the relationship between their health follow up and weight control and their socio-demographic characteristics.
Methodology: A descriptive study was conducted on women with osteoporosis for the period of September, 26th 2020 to Jun, 20th 2021. Non- probability (convenient) sample of (70) women with osteoporosis selected from (5) Private Clinics for Joints and Fractures in Baqubah City. A questionnaire was designed though extensive review of literatures and it consists of three parts: the first part includes women’s socio demographic characteristics, the second part inclu
... Show MoreThe principle in the language is that each word has one meaning. This is because the purpose of language development is for understanding, understanding, and communication between people. The language is sounds with which each people expresses their Arabic language did not stop at this point, but rather needed another next stage or to convey additional features or characteristics that would qualify it. To be the language of the Qur’an and revelation, and capable of carrying this heavy burden.