Let be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset is a minimum neighborhood dominating set if is a dominating set and if for every holds. The minimum cardinality of the minimum neighborhood dominating set of a graph is called as minimum neighborhood dominating number and it is denoted by . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the smallest number of vertices needed to form a minimum neighborhood-dominating set. The concept of minimum neighborhood dominating set is related to the study of the structure and properties of graphs and is used in various fields such as computer science, operations research, and network design. A minimum neighborhood dominating set is also useful in the study of graph theory and has applications in areas such as network design and control theory. This concept is a variation of the traditional dominating set problem and adds an extra constraint on the intersection of the neighborhoods of the vertices in the set. It is also an NP-hard problem. The main aim of this paper is to study the minimum neighborhood domination number of the split graph of some of the graphs.
Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show Moreملخص البحث: تعتبر مشكلة تعاطي المخدرات من المشكلات التي تؤثر في بناء المجتمع وأفراده لما يترتب عليها من آثار اجتماعية واقتصادية ونفسية سيئة تنسحب على الفرد و على المجتمع، كما أنها ظاهرة اجتماعية مرضية تدفع إليها عوامل عديدة؛ بعضها يتعلق بالفرد والبعض الآخر بالأسرة والثالث بالبناء الاجتماعي ككل. وتعد ظاهرة انتشار المخدرات من الظواهر الأكثر تعقيدا وبارزة هذه الظاهر ة وإحدى مشكلات العصر، الشاملة في المجتمع، و
... Show MoreThis thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera
... Show MoreAbstract:
The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.
A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe effect of the concentration of the colloidal nanomaterial on their optical limiting behavior is reported in this paper. The colloids of sliver nanoparticles in deionized water were chemically prepared for the two concentrations (31 ppm and 11ppm). Two cw lasers (473 nm Blue DPSS laser and 532 nm Nd:YAG laser) are used to compare the optical limiting performance for the samples. UV–visible spectrophotometer, transmission electron microscope (TEM) and Fourier Transformation Infrared Spectrometer (FTIR) were used to obtain the characteristics of the sample. The nonlinear refractive index was calculated to be in the order of 10-9 cm2/W. The results demonstrate that the observed limiting response is significant for 532nm. In addition, t
... Show MoreAbstract
This research aims to evaluate the application of the inspectors general of global indicators offices according to the axles (leadership, strategy and planning, employees, partners and resources, process management) and through the assumption main research which states that (there is an application for global indicators to evaluate performance in the offices of the ministries under study) which are subdivided into five sub-hypotheses according to the classification and division of the five axes of the checklist.
The researchers have taken refuge in the process of assessing the performance of the check list which included global i
... Show MoreIn this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological
... Show More