Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Corrosion rate tests were carried out on carbon steel under concentration cells conditions of oxygen and sodium chloride. The effect of aeration in one compartment on the corrosion rate of both coupled metals was determined. In addition, the effects of time and temperatures on the corrosion rate of both coupled metals and galvanic currents between them were investigated. Corrosion potentials for the whole range of operating conditions under concentration cell conditions were also studied. The results showed that under aeration condition, the formation of concentration cell caused a considerable corrosion rate of the Carbon steel specimens coupled in different concentrations of O2 and NaCl due to the galvanic effect
... Show MoreDevelopment of a precise and delicate reaction has been acquired for the determination of vancomycin hydrochloride using batch and cloud point extraction (CPE) methods. The first method is based on the formation of azo dye as a result of diazotized dapsone coupled with vancomycin HCl (VAN) in a basic medium. The sensitivity of this reaction was enhanced by utilizing a nonionic surfactant (Triton X-114) and the cloud point extraction technique (second method). The azo dye formed was extracted into the surfactant-rich phase, dissolved in ethanol and detected at λmax 440 nm spectrophotometrically. The reaction was investigated using both batch and CPE methods (with and without extraction), and a simple comparison between the two
... Show MoreThe study highlighted the transformation of value systems and educational patterns between past and present, especially with the introduction of modern variables and means, such as mobile phones, the internet, social media, and others. These factors have contributed both positively and negatively to the study. The study highlights the integral role of the school in collaboration with the family in guiding and educating children. It also emphasizes the active role of the school in developing students' abilities and skills, either attracting them to school or vice versa. This includes an examination of the essential skills required in education and their role in achieving a state of psychological well-being and systematically developing child
... Show MoreA monthly correlation between urban vegetation growth and potential evapotranspiration (PET) is needed for better knowledge of controlling water resources and organized irrigation processes. This study aims to explore their relationship within an urban area like Baghdad, using a linear regression model to derive a best-fit line drawn in a scatterplot on a monthly time scale. Based on two different monthly data sources: weather variables (e.g., air temperature, solar radiation, and relative humidity) and Sentinel-2 satellite imagery of 2 years, 2018 and 2021, this study presented the interannual variations of PET and normalized difference vegetation index (NDVI). The choice of these ye
In this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i