Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Abstract
Robust controller design requires a proper definition of uncertainty bounds. These uncertainty bounds are commonly selected randomly and conservatively for certain stability, without regard for controller performance. This issue becomes critically important for multivariable systems with high nonlinearities, as in Active Magnetic Bearings (AMB) System. Flexibility and advanced learning abilities of intelligent techniques make them appealing for uncertainty estimation. The aim of this paper is to describe the development of robust H2/H∞ controller for AMB based on intelligent estimation of uncertainty bounds using Adaptive Neuro Fuzzy Inference System (ANFIS). Simulatio
... Show MoreHydroisomerization of Iraqi light naphtha was studied on prepared Ni-Pt/H-mordenite catalyst at a temperature range of 220-300°C, hydrogen to hydrocarbon molar ratio of 3.7, liquid hourly space velocity (LHSV) 1 hr-1 and at atmospheric pressure.
The result shows that the hydrisomerization of light naphtha increases with the increase in reaction temperature at constant LHSV. However, above 270 0C the isomers formation decreases and the reaction is shifted towards the hydrocracking reaction, a higher octane number of naphtha was formed at 270 °C.
Data mining has the most important role in healthcare for discovering hidden relationships in big datasets, especially in breast cancer diagnostics, which is the most popular cause of death in the world. In this paper two algorithms are applied that are decision tree and K-Nearest Neighbour for diagnosing Breast Cancer Grad in order to reduce its risk on patients. In decision tree with feature selection, the Gini index gives an accuracy of %87.83, while with entropy, the feature selection gives an accuracy of %86.77. In both cases, Age appeared as the most effective parameter, particularly when Age<49.5. Whereas Ki67 appeared as a second effective parameter. Furthermore, K- Nearest Neighbor is based on the minimu
... Show MoreThis research was conducted to study the histological structure of the eye in the tree frog (Hyla arborea savignyi) and showed that it is composed of the eyeball and the lens and optic nerve. Appeared eyeball is surrounded by three Tunica from the inside to the outside are Tunica Interna, Tunica vasculosa, Tunica fibrosa. The tunica interna consists of the retina that consists of 10 layers are from outer to inner pigment epithelial layer, rods and cones layer, external limiting membrane, outer nuclear layer, outer plexiform layer, inner nuclear layer, inner plexiform layer , ganglion cells layer , nerve fibers layer, internal limiting membrane .The vascular tunic or Uvea consists of the choroid, ciliary body , and iris . The fibrous coat co
... Show MoreThis research include design and implementation of an Iraqi cities database using spatial data structure for storing data in two or more dimension called k-d tree .The proposed system should allow records to be inserted, deleted and searched by name or coordinate. All the programming of the proposed system written using Delphi ver. 7 and performed on personal computer (Intel core i3).
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreBACKGROUND: Cough-variant asthma (CVA) is a type of asthma in which the main symptom is a dry, non-productive cough. OBJECTIVE: The objective of the study was to evaluate the therapeutic effect of Montelukast in CVA and to investigate the prevalence of Montelukast in CVA. METHODS: A cross-sectional study was conducted on 30 patients with chronic cough at least 8 weeks using Montelukast at Al-Kindy Hospital over the period of January 2018‒March 2018. An interview using questionnaire was used to collect the data that were specifically prepared to meet the objective of study including age, sex, associated disease, exacerbation factors, and classical therapy. RESULTS: There was a reduction of the symptoms associated
... Show MoreIn this paper the concept of (m, n)- fully stable Banach Algebra-module relative to ideal (F − (m, n) − S − B − A-module relative to ideal) is introducing, we study some properties of F − (m, n) − S − B − A-module relative to ideal and another characterization is given
The topological parameters of the metal-metal and metal-ligand bonding interactions in a trinuclear tetrahydrido cluster [(Cp*Co) (CpRu)2 (μ3-H) (μ-H)3]1 (Cp* = η5 -C5Me4Et), (Cp = η5 -C5Me5), was explored by using the Quantum Theory of Atoms-in-Molecules (QTAIM). The properties of bond critical points such as the bond delocalization indices δ (A, B), the electron density ρ(r), the local kinetic energy density G(r), the Laplacian of the electron density ∇2ρ(r), the local energy density H(r), the local potential energy density V(r) and ellipticity ε(r) are compared with data from earlier organometallic system studies. A comparison of the topological processes of different atom-atom interactions has become possible than
... Show More