Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
In the last few years, the Internet of Things (IoT) is gaining remarkable attention in both academic and industrial worlds. The main goal of the IoT is laying on describing everyday objects with different capabilities in an interconnected fashion to the Internet to share resources and to carry out the assigned tasks. Most of the IoT objects are heterogeneous in terms of the amount of energy, processing ability, memory storage, etc. However, one of the most important challenges facing the IoT networks is the energy-efficient task allocation. An efficient task allocation protocol in the IoT network should ensure the fair and efficient distribution of resources for all objects to collaborate dynamically with limited energy. The canonic
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreMost Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreFetal growth restriction is a significant contributor to fetal morbidity and mortality. In addition, there are heightened maternal risks associated with surgical operations and their accompanying dangers. Monitoring fetal development is a crucial objective of prenatal care and effective methods for early diagnosis of Fetal growth restriction, allowing prompt management and timely intervention to improve the outcomes. Screening for Fetal growth restriction can be achieved via many modalities; it can be medical, biochemical, or radiological. Some recommended combining more than one for better outcomes. Currently, there is inconsistency about the best method of Fetal growth restriction screening. In this review, a comprehensive
... Show MoreThe Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin
... Show MoreIn recent years, there has been a rise in interest in the study of antibiotic occurrence in the aquatic environment due to the negative consequences of prolonged exposure and the potential for bacterial antibiotic resistance. Most antibiotic residues from treated wastewater end up in the aquatic environment as they are not eliminated in facilities that treat wastewater. Antibiotics must be identified in influent and effluent wastewater using reliable analytical techniques for several reasons. Firstly, monitoring antibiotic presence in aquatic environments. Secondly, assessing environmental risks, computing wastewater treatment plant removal efficiencies, and estimating antibiotic consumption. Therefore, this work aims to provide an overview
... Show MoreThe aim of this study was to increasing natural carotenoides production by a locally isolate Rodotorula mucilagenosa M. by determination of the optimal conditions for growth and production of this agents, for encouragest to use it in food application permute artificial pigments which harmfull for consumer health and envieronmental. The optimal condition of carotenoides production from Rhodotorula mucilaginosa M were studied. The results shows the best carbon and nitrogen source were glucose and yeast extract. The carotenoids a mount production was 47430 microgram ̸ litter and 47460 microgram ̸ litter, respectively, and the optimum temperature was 30°C, PH 6, that the carotenoides a mount was 47470 microgram ̸ litter and 47670 microgr
... Show More