Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Background: Polycystic ovary syndrome (PCOS) is one of the most frequent endocrine illnesses affecting reproductive - age women. L-carnitine has important roles in oxidative stress, energy production and glucose metabolism. It affects insulin resistance as decreased plasma carnitine level has been well reported in type II diabetes mellitus. Hence, it means L-carnitine may reduce insulin resistance which is found in PCO disease. Objective: This study aims to measure the level of L-carnitine and insulin resistance in both obese and non- obese patients with PCOS. Patients and Methods: Sixty women within the reproductive age with PCOS (30 obese and 30 non- obese) were recruited from the Gynecology and Obstetrics Outpatient Clinic in Baghdad T
... Show MoreThe icon and the symbol represent the constituents of the communication process, through their intellectual and philosophical concepts that have been addressed by the current research that it has touched upon their importance in conveying the design idea for the recipient and showing the specificity of each one of them in the communication process. The research problem has been limited by the following question: what are the communication roles that the symbol and the icon present for the user in designing the industrial product?
The research objective is to reveal the theoretical visualization that describes the icon and the symbol in the industrial product and its importance in the communication process through stating the of simil
Chronic myelogenous leukemia (CML) is a myeloproliferative neoplasm arises from Bcr-Abl gene translocation (called Ph chromosome) in hematopoietic stem cells (HSCs). This genetic abnormality results in constitutive activation of tyrosine kinase and subsequent uncontrol growth and multiplication of granulocytes. The cornerstone in treatment of CML are tyrosine kinase inhibitors, of which imatinib is the most effectively used. JAK2V617F mutation is an acquired single nucleotide polymorphism (SNP) occurs in JAK2 gene and is associated with many hematological malignancy other than CML. It was thought that the two genetic abnormalities (Bcr-Abl and JAK2V617F) occur mutually; however, growing body of evidences suggested the reverse. This study a
... Show MoreCorrosion rate tests were carried out on carbon steel under concentration cells conditions of oxygen and sodium chloride. The effect of aeration in one compartment on the corrosion rate of both coupled metals was determined. In addition, the effects of time and temperatures on the corrosion rate of both coupled metals and galvanic currents between them were investigated. Corrosion potentials for the whole range of operating conditions under concentration cell conditions were also studied. The results showed that under aeration condition, the formation of concentration cell caused a considerable corrosion rate of the Carbon steel specimens coupled in different concentrations of O2 and NaCl due to the galvanic effect
... Show MoreThe Noble Qur’an is the book of God, the Blessed and Exalted, in which is the teachings of God Almighty’s religion, which is Islam, in order for people to unite it and establish servitude to it. The individual and the society alike saw it appropriate to make my opinion alerting the seriousness of this matter, so the research was entitled (The Impact of Sins and Disobedience on the Individual and Society in the Holy Qur’an - Objective Study), knowing that we touched upon some of the effects, which we found it appropriate to mention in this research in the service of the good. Its details came in the Holy Qur’an without referring to others, noting their arrangement in the Holy Qur’an..
Alice Walker (1944) ranks among the greatest American writers of the twentieth century. Through her novels Meridian and the color Purple, Alice outlines many issues concerning the effect of authoritarian thinking upon its often innocent victims, and the possibility of meaningful, productive resistance. Walker's texts aim at giving a voice to those who have no voice especially those poor, rural black women who are robbed of power and the right to make decisions about their own lives by a range of forces standing against them. These texts also aim at clarifying how Walker's female protagonists, Meridian and Celia try to free themselves from oppression, misery , fear and underestimation
... Show MoreThis study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.
Foundations supporting reciprocating engines, radar towers, turbines, large electric motors, and generators, etc. are subject to vibrations caused by unbalanced machine forces as well as the static weight of the machine. If these vibrations are excessive, they may damage the machine or cause it not to function properly. In the case of block foundation, if changes in size and mass of the foundation do not lead to a satisfactory design, a pile foundation may be used. In this study, the dynamic response of piles and pile Groups in dry sand is investigated experimentally. The analysis involves the displacement response under harmonic excitation. In addition, a numerical modeling by using finite element method with a three-dimensional formula
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i