Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The emergence of COVID-19 has resulted in an unprecedented escalation in different aspects of human activities, including medical education. Students and educators across academic institutions have confronted various challenges in following the guidelines of protection against the disease on one hand and accomplishing learning curricula on the other hand. In this short view, we presented our experience in implementing e-learning to the undergraduate nursing students during the present COVID-19 pandemic emphasizing the learning content, barriers, and feedback of students and educators. We hope that this view will trigger the preparedness of nursing faculties in Iraq to deal with this new modality of learning and improve it should t
... Show MoreThis paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show Moreتعد الملابس وسيلة هامة لكل مايقوم به الانسان في حياته العامة ، فهي الانطباع والكلمة الخارجية عن ذاته الداخلية فهي تعكس فكرة الفرد عن ذاته وعن شخصيته , كما تعد وسيلة تعبير جمالية وفنية , فهي تساعد على اخفاء عيوب الجسد وابراز محاسنه . ويتوقف اختيار الفرد لملابسه على مجموعة عوامل منها احتياجه , قدراته المالية , سنه , مركزه الاجتماعي , طبيعة عمله ,الظروف الجوية التي يعيش فيها وعلى مايُؤمن به من قيم و
... Show MoreThis paper concerns is the preparation and characterization of a bidentate ligand [4-(5,5- dimethyl-3-oxocyclohex-1-enylamino)-N-(5-methylisoxazol-3-yl) benzene sulfonamide]. The ligand was prepared from fusing of sulfamethoxazole and dimedone at (140) ºC for half hour. The complex was prepared by refluxing the ligand with a bivalent cobalt ion using ethanol as a solvent. The prepared ligand and complex were identified using Spectroscopic methods. The proposed tetrahedral geometry around the metal ions studied were concluded from these measurements. Both molar ratio and continuous variation method were studied to determine metal to ligand ratio (M:L). The M to L ratio was found to be (1:1). The adsorption of cobalt complex was carried out
... Show MoreThe logistic regression model regarded as the important regression Models ,where of the most interesting subjects in recent studies due to taking character more advanced in the process of statistical analysis .
The ordinary estimating methods is failed in dealing with data that consist of the presence of outlier values and hence on the absence of such that have undesirable effect on the result. &nbs
... Show MoreAbstract
The Non - Homogeneous Poisson process is considered as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).
This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto , to estimate th
... Show MoreIn this work magnetite/geopolymer composite (MGP) were synthesized using a chemical co-precipitation technique. The synthesized materials were characterized using several techniques such as: “X-ray diffraction (XRD), Fourier-transform infrared spectroscopy (FTIR), vibrating sample-magnetometer (VSM), field-emission scanning electron microscopy (FE-SEM), energy dispersive X-ray spectroscopy (EDS), Brunauer–Emmett–Teller (BET) and Barrentt-Joyner-Halenda (BJH)” to determine the structure and morphology of the obtained material. The analysis indicated that metal oxide predominantly appeared at the shape of the spinel structure of magnetite, and that the presence of nano-magnetite had a substantial impact on the surface area and pore st
... Show More