The necessary optimality conditions with Lagrange multipliers are studied and derived for a new class that includes the system of Caputo–Katugampola fractional derivatives to the optimal control problems with considering the end time free. The formula for the integral by parts has been proven for the left Caputo–Katugampola fractional derivative that contributes to the finding and deriving the necessary optimality conditions. Also, three special cases are obtained, including the study of the necessary optimality conditions when both the final time and the final state are fixed. According to convexity assumptions prove that necessary optimality conditions are sufficient optimality conditions.
This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,
... Show MoreThe present work involved synthesis of serval new substituted tetrazole via Schiff bases for trimethoprim drug by two steps. The first step involved direct reaction of different ketones and aldehydes with trimethoprim producing the corresponding Schiff bases (1-10), whereas the second step, involved preparation new tetrazoles derivatives (11-20) through reaction of the ready Schiff bases (in the first step) with sodium azidein in dioxin. The prepared compounds were characterized by UV, FT-IR, and some of them by 13C-NMR, 1H-NMR spectroscopy and physical properties.
A new test system for detecting environment carcinogenes and/or mutagenes and their adversary It has been induced. One hundred and fifty mutants were isolated from the basidiomycete fungus Coprinus cinereus which were resistant to guanine analogue S- az.aguanine .All the spontaneous and induced with UV light origin mutants were isolated from the wild type strains Bc9/6.6 and Hd5.5
.These mutants were te ted on selective medium containing different
concentrations of the analogue and also to their ability to usc purine bases and their degredated &nbs
... Show MoreIn this paper, a new form of 2D-plane curves is produced and graphically studied. The name of my daughter "Noor" has been given to this curve; therefore, Noor term describes this curve whenever it is used in this paper. This curve is a form of these opened curves as it extends in the infinity along both sides from the origin point. The curve is designed by a circle/ ellipse which are drawing curvatures that tangent at the origin point, where its circumference is passed through the (0,2a). By sharing two vertical lined points of both the circle diameter and the major axis of the ellipse, the parametric equation is derived. In this paper, a set of various cases of Noor curve are graphically studied by two curvature cases;
... Show MoreThe applications of Ruscheweyh derivative are studied and discussed of class of meromorphic multivalent application. We get some interesting geometric properties, such as coefficient bound, Convex linear combination, growth and distortion bounds, radii of starlikenss , convexity and neighborhood property.
Buckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g
... Show MoreReading Article First of Section 25 of Penal Trials Principles Law of Internal Forces Law makes us say that there are personal and objective regulations governing presence of jurisdiction of internal forces courts. It should be a source of law embodied by the personality of police as law in essence is a law of persons and the character of the perpetrator is not sufficient to determine jurisdiction of these courts. It should be linked with the subject condition, which completes the presence of jurisdiction for these courts, focusing on the essence of the crime and the interest to be protected by the criminal text with respect with the link between the crime and being a policeman. Thes
... Show MoreA gracious invitation was extended to us on 9/11/2002 AD, by the University of Tikrit / the Preparatory Committee, for a symposium (Sheikh Daoud Al-Tikriti, and his Scientific Effects), to participate in it.
The symposium was scheduled to be held on the 25th and 26th of March 2003 AD, but God Almighty decreed that our country be occupied, so the Preparatory Committee set another date for the symposium on 10/21/2003 AD.
It was not possible for the symposium to be held until 25-26/4/2004 AD, and many researchers attended, who were assigned to investigate some manuscripts of Sheikh Dawood (may God have mercy on him) or to write about his personal and scientific biography.
And God (Glory be to Him) did not enable us to attend, becau
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show More