An edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domination value is defined. Further, the exact values of the above said parameters are found for some standard classes of graphs. The bounds of the co-odd (even) sum degree edge domination number are obtained in terms of basic graph terminologies. The co-odd (even) sum degree edge dominating sets are characterized. The relationships with other edge domination parameters are also studied.
This research is concerned with the re-analysis of optical data (the imaginary part of the dielectric function as a function of photon energy E) of a-Si:H films prepared by Jackson et al. and Ferlauto et al. through using nonlinear regression fitting we estimated the optical energy gap and the deviation from the Tauc model by considering the parameter of energy photon-dependence of the momentum matrix element of the p as a free parameter by assuming that density of states distribution to be a square root function. It is observed for films prepared by Jackson et al. that the value of the parameter p for the photon energy range is is close to the value assumed by the Cody model and the optical gap energy is which is also close to the value
... Show MoreImage pattern classification is considered a significant step for image and video processing. Although various image pattern algorithms have been proposed so far that achieved adequate classification, achieving higher accuracy while reducing the computation time remains challenging to date. A robust image pattern classification method is essential to obtain the desired accuracy. This method can be accurately classify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism. Moreover, to date, most of the existing studies are focused on evaluating their methods based on specific orthogonal moments, which limits the understanding of their potential application to various Discrete Orthogonal Moments (DOM
... Show MoreImage pattern classification is considered a significant step for image and video processing.Although various image pattern algorithms have been proposed so far that achieved adequate classification,achieving higher accuracy while reducing the computation time remains challenging to date. A robust imagepattern classification method is essential to obtain the desired accuracy. This method can be accuratelyclassify image blocks into plain, edge, and texture (PET) using an efficient feature extraction mechanism.Moreover, to date, most of the existing studies are focused on evaluating their methods based on specificorthogonal moments, which limits the understanding of their potential application to various DiscreteOrthogonal Moments (DOMs). The
... Show MoreThe objective of present study was to compare of several methods for estimating the degree of heritability and calculating the number of genes using generation mean analysis of maize (
The problem with research in the question of whether art forms in the religious icon Byzantine, heiress docility and tradition craftsman arts civilizations of the above? ... And if you are well, you helped a quotation on the entry of strange ideas rampant within religious traditions, and are prompted to do Movement rejected prohibition, and the outbreak of the icons war? ... Or is it, in fact - and as researcher finds - the result of a need communication between the religious and the recipient organization in the establishment of a deliberative speech, be visible, along with reading it and audible? .. And lies the importance of this study is being added technical knowledge of the library that will enrich researchers and scholars in this
... Show MoreObjective: To identify causes of maternal death in Mizan Aman and Gebretsadik shawo general hospitals
Methodology: A case control study on 595 charts, 119 cases and 476 controls was conducted in Mizan
Aman & Gebretsadik shawo general hospitals. Data was analyzed by STATA 13.1. Propensity score
matching analysis was used to see causes of maternal death.
Results: Hemorrhage were the main direct causes of maternal death which accounts 47.9% (β =0.58
(95% CI (0.28,0.87)) in hospital but when projected to population based the sample (β =0.26 (95% CI
(0.22,0.31)). Followed by infection 36 (25.21%) (β = 0.50 (95% CI (0.08, 0.92)). when projected to
population based the sample PIH 7.6%) is significant cause (β = 0.16
The stories of children in Iraq during the past two decades have received a number of important scientific studies. Despite tyranny of the historical study method on most of these studies, they have been and still are very important, because they have established a chronicle of this literary style that has been neglected and based not only on the academic level and serious in-depth university studies but also on the enclosed sight that doesn’t consider studied art as an innovation with its specificity and its typical technical components. While many of the public impressions and self-reflections contributed to the dominance of some of the provisions and concepts that were circulated as critical remarks and adopted by som
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show More