A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.
The role of drain in agricultural lands is to remove excess surface and subsurface water to create a good environment for root growth and to increase crops yield. The main objective of this research was to evaluate the performance of closed drains when using textile filter instead of crushed gravel filter. The research has been executed in the laboratory using a sand tank model and by using two types of the soil. One of soils was light soil (sandy soil) and the other heavy soil (loamy soil). The tests were classified into four cases; each case was supplied discharge during 10 days. The results showed that the amount of out flow when using graded crushed gravel filter is greater than the amount of out flow in case of usin
... Show MoreThis study aimed to know the concentration of elements content in dairy products. Nine samples collected from the local market in Baghdad, two samples of milk and seven of yoghurt.The results were followed: The ratio of Aluminum In Aluminum cans That is used for storage milk and industrialize yoghurt is about 95.5% ,this ratio is against [1] which said that pureness of Aluminum used in Aluminum cans should not be less than 98-99% . and the ratio of Cadmium reached to 0.001% which is also against [1] which assure that the Aluminum cans should be clean from that element, mean while the concentration of Iron, Copper and Zinc were within the standard level. The highest concentration of Iron was in treatment B2(canon yoghurt)it was 9.95 m
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreThis research was conducted in (Baghdad Teaching hospital) and (Al-Alwiya obstetrics hospital). The Samples were as follows : (150) (Pregnant women) in different times of pregnancy. (25) Married women (non pregnant) . (25) Un married women Capable of pregnancy . The range of their ages was (18-45) years. (10) Samples were taken from pregnant women with no evidence of infection as (Control) for the comparison of number and type of bacteria which exists naturally (in area surrounded external opening of urinary duct) (Urethral meatus) of the infected pregnant women . The result showed that Staphylococcus Saprophyticus is a common Cause in these infections .appearing in (19%) of the studied group, while klebsiella wa
... Show MoreLearning education in the Islamic legacy vision considers a completed The Islamic learning education took its bases from origins of Quran and honored prophet Suna , and stressed on education child a good education and providing him with principles of religion and semantic moral values and Messenger (peace on him) considers the higher example for man in his moral, behavior and goodness and witness on this Higher God said
(you had in God Messenger a good leadership for those were requesting God and last day and mentioned God a lot). Al- Ahzab Surah :21. learning education converts man from religion to another and from culture to another and teacher left his signs on the generation if he accept or refuse.
The research is a contemporary stylistic study of the text that expresses the psychological
meanings in Nahj Al-Balaghah.
The research is divided to three chapters.
The first chapter : characteristics of psychological text.
It is about the power to influence the addressee ,that is to say ,the text influence power
connects with vulnerability and emotions inside the addressee spirit and his response to
violent effects shaking his feelings and that is represented in outbreaking of words vitality and
homogeneously. The Imam's wrath , grief , love to rightness , hatred of falsehood and
deviation from Islam arouses the words and emotions through :
1. Reduction in words and expansion in meaning by means of inspiration
Background .To know the incidence of adenoid hypertrophy in adults causing nasal obstruction and other nasal complains.
Methods.Prospective studyof(140 ) adult patientstheir main chief complaint were nasal obstruction , presented to Otolaryngology department at Aljumhory Teaching Hospital in Mosul , from the period (september 2010 to september 2011) ,their age ranged from (21 to 53) years . They were investigated clinically, radiologicaly ,and nasal endoscopic examination was carried out (rigid and fibro-optic ) . Adenoidectomy was performed for those with adenoid hypertrophy and sent for histopathological study .
Results:. we found adenoid enlargement in(24) patients (17.14%),in addition to nasalobstruction they were also complain
In this paper, we use concepts and results from percolation theory to investigate and characterize the effects of multi-channels on the connectivity of Dynamic Spectrum Access networks. In particular, we focus on the scenario where the secondary nodes have plenty of vacant channels to choose from-a phenomenon which we define as channel abundance. To cope with the existence of multi-channels, we use two types of rendezvous protocols: naive ones which do not guarantee a common channel and advanced ones which do. We show that, with more channel abundance, even with the use of either type of rendezvous protocol, it becomes difficult for two nodes to agree on a common channel, thereby potentially remaining invisible to each other. We model this
... Show More