Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreA Factorial Study for separation anxiety in students, of Baghdad City
Pathology reports are necessary for specialists to make an appropriate diagnosis of diseases in general and blood diseases in particular. Therefore, specialists check blood cells and other blood details. Thus, to diagnose a disease, specialists must analyze the factors of the patient’s blood and medical history. Generally, doctors have tended to use intelligent agents to help them with CBC analysis. However, these agents need analytical tools to extract the parameters (CBC parameters) employed in the prediction of the development of life-threatening bacteremia and offer prognostic data. Therefore, this paper proposes an enhancement to the Rabin–Karp algorithm and then mixes it with the fuzzy ratio to make this algorithm suitable
... Show MoreZernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreObjective: An efficient solution for stabilization is the mobilization of the joints for the arthrokinematics affected by the positional defect of the CAI (i.e. chronic ankle instability). This study put to comparison the impacts of ankle dorsi flexion range of motion (DFROM) as well as dynamic balance ability (DBA) in the patients who have CAI using PJM (i.e. passive joint mobilization), a technique typically been used in previous works, and active joint mobilization (AJM), a technique which could have a greater impact on cortical excitability with the spontaneous movement. Design: rehabilitation program to treat recurrent ankle. Methods: A total of 10 players from the Iraqi clubs Muay Thai team were registered, 5 from each of
... Show MoreIn this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the b
... Show MoreAn analytical expression for the charge density distributions is derived based on the use of occupation numbers of the states and the single particle wave functions of the harmonic oscillator potential with size parameters chosen to reproduce the observed root mean square charge radii for all considered nuclei. The derived expression, which is applicable throughout the whole region of shell nuclei, has been employed in the calculations concerning the charge density distributions for odd- of shell nuclei, such as and nuclei. It is found that introducing an additional parameters, namely and which reflect the difference of the occupation numbers of the states from the prediction of the simple shell model leads to obtain a remarkabl
... Show More