Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Climate change is one of the global issues that is receiving wide attention due to its clear impact on all living organisms. This is essential for Iraq since it was classified as the fifth most vulnerable country to climate change. One of the manifestations of these changes in Iraq is the increasing frequency and severity of dust storms. In this study, the Normalized Difference Dust Index (NDDI) spectral index for Moderate Resolution Imaging Spectroradiometer (MODIS) sensor bands was used to measure and track the dust storm that occurred on May 16, 2022, as well as to test the validity of one of the daily products of this sensor, MOD11A1, to measure surface temperature and emissivity before and after the storm. It was found that the MOD0
... Show MoreAn immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a c
... Show MoreAnise and thyme crude extract were used to prepare a lotion for topical application due to their antimicrobial, germicidal and antifungal effects. Two formulas were prepared using the mentioned natural plants, formula 2 (selected lotion) was the most acceptable one which contained veegum and xanthan gum as suspending agents in addition to other exceipients providing it good properties with high physical stability because of its flocculating, pouring, resuspending easily with sedimentation volume (F) 0.96. In addition to unchangeable odor and color with expiration date of one year. While the Preliminary clinical study was done using this lotion on 10 patients with infecious viral skin diseases, it was found that this lotion was successful
... Show MoreThe energy expectation values for Li and Li-like ions ( , and ) have been calculated and examined within the ground state and the excited state in position space. The partitioning technique of Hartree-Fock (H-F) has been used for existing wave functions.
As s widely use of exchanging private information in various communication applications, the issue to secure it became top urgent. In this research, a new approach to encrypt text message based on genetic algorithm operators has been proposed. The proposed approach follows a new algorithm of generating 8 bit chromosome to encrypt plain text after selecting randomly crossover point. The resulted child code is flipped by one bit using mutation operation. Two simulations are conducted to evaluate the performance of the proposed approach including execution time of encryption/decryption and throughput computations. Simulations results prove the robustness of the proposed approach to produce better performance for all evaluation metrics with res
... Show MoreThe problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as
... Show MoreMany numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.