The necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
Alginate is one of the natural biopolymers that is widely used for drug formulations, combination of alginate with other polymers, such as gum acacia, pectin, and carrageenan can increase mechanical strength, therefore, can reduce leakage of the encapsulated active pharmaceutical ingredient from the polymer matrix. Interaction of alginate and these polymers can occur via intermolecular hydrogen bonds causing synergism, which is determined from the viscosity of polymer mixture.
Alginate was combined with gum acacia/pectin/carrageenan in different blending ratios (100:0, 75:25, 50:50, 25:75, and 0:100) with and without addition of CaCl2. The synergism effect is obtained from the design of experimental (DoE), and calculati
... Show More
A descriptive study, which was using an assessment approach, was conducted for the
determination of the impact of rheumatoid arthritis and osteoarthritis patient’s functional disability
upon their life style. The study was carried out at the Rheumatology and outpatients clinics of ALKarama
Teaching Hospital, Baghdad Teaching Hospital AL-Kindey Teaching Hospital and Specialized
surgeries Teaching Hospital for the period of October 15th 2003 through May 13th 2004 in Baghdad
City. A purposive (non-probability) sample of (245) arthritis patients which was comprised (111)
rheumatoid arthritis patients and (134) osteoarthritis patients, was selected out of the early stated
settings. The questionnaire was comprised of
In this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreMost of the propositions and researches that dealt with fashions in the Middle East, specifically this region from the world, from a historical perspective have not been sufficient, and were characterized by many aspects of immature thinking, in addition, they have been varied in quality. This can be attributed to many factors including: the focus in the field of researches and Middle East studies is on languages, arts, history, and political thinking of the region. Other factors are the information asymmetry, the differences in sources and references, in addition to differences in the scientific value of these sources added to the difficulty of gathering them at the same time especially that these sources are scattered in many places wh
... Show MoreAssessing the accuracy of classification algorithms is paramount as it provides insights into reliability and effectiveness in solving real-world problems. Accuracy examination is essential in any remote sensing-based classification practice, given that classification maps consistently include misclassified pixels and classification misconceptions. In this study, two imaginary satellites for Duhok province, Iraq, were captured at regular intervals, and the photos were analyzed using spatial analysis tools to provide supervised classifications. Some processes were conducted to enhance the categorization, like smoothing. The classification results indicate that Duhok province is divided into four classes: vegetation cover, buildings,
... Show MoreThis paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreThree cultivars of the crop Almash (Green Indian VC6089A10, Green Indian VC6173B1319, and Black Indian Gold Star) were tested in a field experiment during the 2022 growing season in Ramadi, Anbar province, to determine the impact of spraying levels of zinc (0, 25, and 50) mg Zn L-1 and manganese (0, 30, and 60) mg Mn L-1 on some growth characteristics. The experiment was conducted using a randomized complete block design (RCBD) with three replicates, with each treatment being tested in a separate split plot. The study found that there were statistically significant differences between zinc levels, with the level giving 50 mg Zn L-1