Let be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset is a minimum neighborhood dominating set if is a dominating set and if for every holds. The minimum cardinality of the minimum neighborhood dominating set of a graph is called as minimum neighborhood dominating number and it is denoted by . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the smallest number of vertices needed to form a minimum neighborhood-dominating set. The concept of minimum neighborhood dominating set is related to the study of the structure and properties of graphs and is used in various fields such as computer science, operations research, and network design. A minimum neighborhood dominating set is also useful in the study of graph theory and has applications in areas such as network design and control theory. This concept is a variation of the traditional dominating set problem and adds an extra constraint on the intersection of the neighborhoods of the vertices in the set. It is also an NP-hard problem. The main aim of this paper is to study the minimum neighborhood domination number of the split graph of some of the graphs.
Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreAbstract
Research aims : The aim of the research is to evaluate the reality of the inspection teams' work in the health institutions belonging to Dhi-Qar health office .
Purpose: This research seeks to present a point of view based on knowing the extent of health service quality in Dhi-Qar governorate and discover the role of the inspection teams in enhancing the health service.
Design / Methodology/ Approach: The experimental method has been used and the questionnaire has also been used to collect data in order to develop a reliable and correct measurement model for the research's variables . The research's hypotheses have been tested through using some statistical treat
... Show MoreThe study aims (objective ) to clarify the concept of comprehensive income and its usefulness for users, as the study aims to clarify the relationship between the concept of comprehensive income and market value of the company where the measurement of comprehensive income after accounting for net income and by measuring the unrealized gains or losses in the value of securities available for sale, and measurement the unrealized gains or losses on futures contracts, which are financial derivatives, and measurement the unrealized gains or losses from the settlement of foreign currency translation (conversions), and measurement the impact on the market value of companies and of the present study to rise or fall of return on the stock
... Show MoreAs computers become part of our everyday life, more and more people are experiencing a
variety of ocular symptoms related to computer use. These include eyestrain, tired eyes, irritation,
redness, blurred vision, and double vision, collectively referred to as computer vision syndrome.
The effect of CVS to the body such as back and shoulder pain, wrist problem and neck pain.
Many risk factors are identified in this paper.
Primary prevention strategies have largely been confined to addressing environmental
exposure to ergonomic risk factors, since to date, no clear cause for this work-related neck pain
has been acknowledged. Today, millions of children use computers on a daily basis. Extensive
viewing of the compute
This study aims to Statement of the relationship between Total Quality Management philosophy and Organizational performance from the point of view of the internal customer. A comparison has been made between two companies, one of which applies the requirements of TQM well and the other does not apply these requirements as the (General Company for Electrical Industries/ Diyala) and (General Company for Electrical Industries/ Baghdad) to conduct the search, During the questionnaire prepared for this purpose and distributed to a sample of 30 employees in the General Company for Electric Industries/ Diyala and (20) employees of the General Company for Electrical Industries/ Baghdad. Their answers were analyzed using a simple correlation coef
... Show MoreIn today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreThe banking sector has a significant impact on the economic growth of the country, and the importance of this sector must assess its financial performance from time to time, to measure the situation related to money for each bank and how to put the supervision of the efficiency of the full. The research aims at evaluating the financial performance according to the elements of the CAMELS model, which including capital adequacy, asset quality, management efficiency, profitability, liquidity and market risk sensitivity. The research included the study of Al-Mansour Investment Bank during the period from 2014 to 2018. The base capital ratio was used to total assets to measure capital adequacy The proportion of investments to total assets to mea
... Show MoreSpecies of genus Chrotogonus (surface grasshoppers) are phytophagous and damaging to various economical important plants in their seedling stages. In order to know the biodiversity of surface grasshoppers, the detailed study has been conducted from four provinces of Pakistan. During this study, biodiversity, taxonomy, diagnosis, morphometric analysis, habitat, global distribution, and remarks of each species have been described. Total of 826 specimens were collected and sorted out into three species and three subspecies: C. (Chrotogonus) homalodemus homalodemus (Blanchard, 1836), C. (Chrotogonus) homalodemus (Blanchard, 1836), C. (Chrotogonus) trachypter
... Show MoreIn today's world the role of leadership in the control factors of the organization different and advancement, and that the possession of the human ability to the development and creation and innovation varies from one individual to another depending on experience; and levels of performance and intellectual; and his mental and physical and other such factors can create a kind of differentiation between the built humans, and this distinction creates our leaders are able to influence others and have the wisdom and connect active individuals and organizations. as the need for organizations of all sizes and levels of leadership transformation is an urgent need to link the application of the various plans and strategies device which direction
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show More