Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
At the beginning of the twentieth century distorting handling totalitarian phenomena of art, which can be called the stage of the test, transition from the theory of ideal theory and other realistic is not cushy, since it requires vision and reading and other concepts, and in light of this dialectic manifested research problem by asking the following Is affected by the design idealism and realism. Through the above mentioned questions, the researcher found rationale for addressing this problem, the study through his research, which is marked (idealism and realism in a comparative study design). And demonstrated the importance of research in the identification of the concept and the effectiveness of the two theories idealism and realism a
... Show MoreThe present study attempts to give a detailed discussion and analysis of parenthetical constructions in English and Arabic, the aim being to pinpoint the points of similarity and difference between the two languages in this particular linguistic area.The study claims that various types of constructions in English and Arabic could be considered parenthetical; these include non-restrictive relative clauses, non-restrictive appositives, comment clauses, vocatives, interjections, among others. These are going to be identified, classified, and analyzed according to the Quirk grammar - the approach to grammatical description pioneered by Randolph Quirk and his associates, and published in a series of reference grammars during the 1970
... Show MoreThis piece of research deals with assimilation as one of the phonological processes in the language. It is a trial to give more attention to this important process in English language with deep explanation to its counterpart in Arabic. in addition, this study sheds light on the points of similarities and differences concerning this process in the two languages. Assimilation in English means two sounds are involved, and one becomes more like the other.
The assimilating phoneme picks up one or more of the features of another nearby phoneme. The English phoneme /n/ has t
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreABSTRACT
The current research aims at highlighting the role of engagement of a sample of employees who works in some of the Iraqi private banks in terms of their interaction , commitment and enthusiasm and the positive impact they own regarding their job and devote their efforts to achieve the core purpose which is customer loyalty. The problem was expressed through a number of intellectual and practical questions.
In order to achieve the aim of the research the quantitative analytical method was used depending on a questionnaire as a basic tool to collect research data and the qualitative survey method depending on semi-structured interviews which were distrib
... Show MoreThe topic of strategic intelligence is considered as important topics that acquires the attention of organizations, Because of its role in supplying the decision-making centers by strategic ideas according to the opportunities and threats facing the organization, in an effort to improve the performance of their organizations to reach the high performance organization.
A lot of organizations lack to strategy guides the strategic intelligence towards achieving high performance organization.
This research aims to determine the level of strategic intelligence that characterized the leaders of diseases and kidney transplant center in Medicine city. What is the application level of the
... Show MoreAbstract in English The aim of this study is to identify the effectiveness of rehabilitation exercises in conjunction with aquatic therapy for those suffering from sacroiliitis in football players. The researcher used the experimental approach, using the experimental design (pre-measurement, post-measurement). Similar to the objectives and procedures of the research, the researcher assumed the following: the existence of significant differences. Statistics between pre- and post-measurements in variables in favor of post-measurement for the following variables (degree of pain and level of balance). The experimental approach was used with a pre- and post-measurement design on one group of football players with sacroiliitis, nu
... Show More