A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.
Using the traditional methods in teaching Islamic subject have neglected student's role and focus mainly toward teacher. Thus, the role of student in teaching process would take a negative side: following these methods cannot achieve the educational objectives of Islamic subject. Teachers who give Islamic subject do not have a full knowledge of the appropriate techniques in teaching. They lack the scientific background that qualify them for teaching. The weakness of knowledge that face Islamic teachers have arisen over different stages of education which showed their lacking in the provision of intonation and interpretation of the Quran as well as the utterance of Prophet Mohammed Hadiths. It takes time to train teachers to do a
... Show MoreEffect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there
is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated
This research consists of two parts, the first part concern with analyzing the collected data of BOD and COD values in discharge waste water from Al-Dora refinery during 2010 to find the relationship between these two variables The results indicates that there is a high correlation between BOD and COD when using a natural logarithm model (0.86 ln(COD)) with correlation coefficient of 0.98. This relationship is useful in predicting the BOD value using the COD value. The second part includes analyzing collected data from the same site in order to find a relationsip between BOD and other parameters COD, Phenol(phe), Temperature(T), Oil, Sulphat(SO4),pH and Total dissolved solids( TDS) discharged from the refinery. The results indicated that th
... Show MoreThe current research aims to identify the effectiveness of a computerized program in developing mathematical skills among the first cycle students in basic education schools in the Sultanate of Oman. The two researchers used the quasi-experimental approach on an intentional sample consisting of (40) male and female students at Al Kawakeb School for Basic Education (1-4). Two of the basic fourth-grade classes and then randomly distributing them into two groups, one is experimental (20) male and female students who followed the computerized interactive program, and the other is (20) male and female students followed the traditional way. On the other hand, its reliability has reached (0.81), and the results of the research have concluded th
... Show MoreThis thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera
... Show MoreThe aim of this paper is to introduce the concept of N and Nβ -closed sets in terms of neutrosophic topological spaces. Some of its properties are also discussed.
The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio
... Show More