Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Acinetobacter baumannii (A. baumannii ) is considered a critical healthcare problem for patients in intensive care units due to its high ability to be multidrug-resistant to most commercially available antibiotics. The aim of this study is to develop a colorimetric assay to quantitatively detect the target DNA of A. baumannii based on unmodified gold nanoparticles (AuNPs) from different clinical samples (burns, surgical wounds, sputum, blood and urine). A total of thirty-six A. baumannii clinical isolates were collected from five Iraqi hospitals in Erbil and Mosul provinces within the period from September 2020 to January 2021. Bacterial isolation and biochemical identification of isolates
... Show MoreIn this paper further properties of the fuzzy complete a-fuzzy normed algebra have been introduced. Then we found the relation between the maximal ideals of fuzzy complete a-fuzzy normed algebra and the associated multiplicative linear function space. In this direction we proved that if is character on Z then ker is a maximal ideal in Z. After this we introduce the notion structure of the a-fuzzy normed algebra then we prove that the structure, st(Z) is -fuzzy closed subset of fb(Z, ) when (Z, , , ) is a commutative fuzzy complete a-fuzzy normed algebra with identity e.
Worshipersrighteousness in declaration of purposes of belief
Laith Salman Dawood
Iraqi Sunni Affairs/Department of Religious and Charity Institutions
Abstract
Praise is to God and Prayers and peace is upon the Messenger of Allah and his family and companions and then:
The research here presents to the question of standing on the purpose of belief and its importance, which corresponds to going into the purposes of the Sharia acts and Worship, which are no less important and perhaps the most important. The health of belief is the only way to correct work and worship. The research first dealt with the definition of the doctrine and its pil
... Show MoreThe ability of beans (Phaseolus vulgaris L.) to uptake three pharmaceuticals (diclofenac, mefenamic acid and metronidazole) from two types of soil (clay and sandy soil) was investigated in this study to explore the human exposure to these pharmaceuticals via the consumption of beans. A pot experiment was conducted with beans plants which were grown in two types of soil for six weeks under controlled conditions. During the experiment period, the soil pore water was collected weekly and the concentrations of the test compounds in soil pore water as well as in plant organs (roots, stems and leaves) were weekly determined.
The results showed that the studied pharmaceuticals were detected in all plant tissues; their concentration
Numerous integral and local electron density’s topological parameters of significant metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp* Ir) (Cp Ru)2 (μ3-H) (μ-H)3]1 (Cp = η5 -C5Me5), (Cp* = η5 -C5Me4Et) were calculated and interpreted by using the quantum theory of atoms in molecules (QTAIM). The properties of bond critical points such as the delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density
... Show MoreThe Internet of Things (IoT) is a network of devices used for interconnection and data transfer. There is a dramatic increase in IoT attacks due to the lack of security mechanisms. The security mechanisms can be enhanced through the analysis and classification of these attacks. The multi-class classification of IoT botnet attacks (IBA) applied here uses a high-dimensional data set. The high-dimensional data set is a challenge in the classification process due to the requirements of a high number of computational resources. Dimensionality reduction (DR) discards irrelevant information while retaining the imperative bits from this high-dimensional data set. The DR technique proposed here is a classifier-based fe
... Show MoreSupport vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca
... Show More