Preferred Language
Articles
/
bsj-8404
Minimum Neighborhood Domination of Split Graph of Graphs
...Show More Authors

Let  be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset  is a minimum neighborhood dominating set if  is a dominating set and if for every  holds. The minimum cardinality of the minimum neighborhood dominating set of a graph  is called as minimum neighborhood dominating number and it is denoted by  . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the smallest number of vertices needed to form a minimum neighborhood-dominating set. The concept of minimum neighborhood dominating set is related to the study of the structure and properties of graphs and is used in various fields such as computer science, operations research, and network design. A minimum neighborhood dominating set is also useful in the study of graph theory and has applications in areas such as network design and control theory. This concept is a variation of the traditional dominating set problem and adds an extra constraint on the intersection of the neighborhoods of the vertices in the set. It is also an NP-hard problem. The main aim of this paper is to study the minimum neighborhood domination number of the split graph of some of the graphs.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Theoretical And Applied Information Technology
Graph based text representation for document clustering
...Show More Authors

Advances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an

... Show More
Preview PDF
Scopus (15)
Scopus
Publication Date
Tue Feb 27 2024
Journal Name
مؤسسة دار الصادق الثقافية
الجامعة ودورها في الحد من تعاطي المخدرات وتأثيرها على المدمنين (اسباب وحلول ومعالجات)
...Show More Authors

ملخص البحث: تعتبر مشكلة تعاطي المخدرات من المشكلات التي تؤثر في بناء المجتمع وأفراده لما يترتب عليها من آثار اجتماعية واقتصادية ونفسية سيئة تنسحب على الفرد و على المجتمع، كما أنها ظاهرة اجتماعية مرضية تدفع إليها عوامل عديدة؛ بعضها يتعلق بالفرد والبعض الآخر بالأسرة والثالث بالبناء الاجتماعي ككل. وتعد ظاهرة انتشار المخدرات من الظواهر الأكثر تعقيدا وبارزة هذه الظاهر ة وإحدى مشكلات العصر، الشاملة في المجتمع، و

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
The non-zero divisor graph of a ring
...Show More Authors

Scopus (7)
Scopus
Publication Date
Wed Jun 08 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
THE ROLE OF TAX IDENTIFICATION NUMBER IN TAX FRAUD PREVENTION : APPLIED RESEARCH AT THE GENERAL TAX AUTHORITY IN IRAQ
...Show More Authors

This thesis aims to show the effects of the development of the traditional manual system of the tax accounting process to the electronic system by the activation of the tax identification numbers (TINs) mechanism. The impact of this development is facilitating the tax accounting process, tax fraudand thus increasing the tax outcome.To prove the research hypothesis, an electronic system was designed based on income tax report, estimation note of individuals, in additional to using Adobe Dreamweaver application to write PHP, HTML, Javascript, and CSS web languages to implement  the proposed system. The research reached a set of conclusions, the most important of which is; not enough the communication methods between the Genera

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Bulletin Of Mathematics And Statistics Research
GRAPH OF EQUIVALENCE CLASSES OF A COMMUTATIVE IS-ALGEBRA
...Show More Authors

Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Creative accounting practices for supply contracts and the role of internal audit in reducing them: An exploratory study on a sample of industrial companies in Iraq
...Show More Authors

Abstract:

                The internal control is the tool through which it is possible to verify and ensure the implementation of tasks in accordance with the established plans and programs and to evaluate the level of performance that is implemented within the different companies.

A guarantee from the supplier with the absence of a specialized technical committee that follows up the stages of implementing the contract and disbursing all amounts of financial dues to the supplier before completing the implementation of the contract and overlooking the non-implementation of some clauses of the contract by the committee in charge of

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal Of Laser
The Effect of the Concentration of Colloidal Silver Nanoparticles on Optical Limiting Reliability
...Show More Authors

The effect of the concentration of the colloidal nanomaterial on their optical limiting behavior is reported in this paper. The colloids of sliver nanoparticles in deionized water were chemically prepared for the two concentrations (31 ppm and 11ppm). Two cw lasers (473 nm Blue DPSS laser and 532 nm Nd:YAG laser) are used to compare the optical limiting performance for the samples. UV–visible spectrophotometer, transmission electron microscope (TEM) and Fourier Transformation Infrared Spectrometer (FTIR) were used to obtain the characteristics of the sample. The nonlinear refractive index was calculated to be in the order of 10-9 cm2/W. The results demonstrate that the observed limiting response is significant for 532nm. In addition, t

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating the performance of inspectors general offices in reducing corruption According to global indicators(Field research comparative)
...Show More Authors

Abstract

        This research aims to evaluate the application of the inspectors general of global indicators offices according to the axles (leadership, strategy and planning, employees, partners and resources, process management) and through the assumption main research which states that (there is an application for global indicators to evaluate performance in the offices of the ministries under study) which are subdivided into five sub-hypotheses according to the classification and division of the five axes of the checklist.

The researchers have taken refuge in the process of assessing the performance of the check list which included global i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 07 2018
Journal Name
University Of Baghdad, College Of Education For Pure Sciences / Ibn Al-haitham, Department Of Mathematics
On Topological Structures In Graph Theory
...Show More Authors

In this thesis, we study the topological structure in graph theory and various related results. Chapter one, contains fundamental concept of topology and basic definitions about near open sets and give an account of uncertainty rough sets theories also, we introduce the concepts of graph theory. Chapter two, deals with main concepts concerning topological structures using mixed degree systems in graph theory, which is M-space by using the mixed degree systems. In addition, the m-derived graphs, m-open graphs, m-closed graphs, m-interior operators, m-closure operators and M-subspace are defined and studied. In chapter three we study supra-approximation spaces using mixed degree systems and primary object in this chapter are two topological

... Show More