Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
This srudy aimed to use a new concentration from l\!J3T (Nitroblue tetrazolium) which using NADH stain ( by used eight different concentrations from (0.2% to 0.06% ).
That stain is a mitochondrial and cytoplasmic histochemical stain which gi ves more infom1ation about the metabolic activity of muscle fiber, so it is valuable in determining the types of muscle fibers and good fiber differentiation type {T) and type (TT) fibers), by reducing NBT in the location of enzyme and gives a blue color in different degrees according to the types of muscle fibers, and we noticed that the concentration 0.1% from NBT gives a good result and di
... Show MoreA newly derivative of oxazolidin-5- one namely [2-(2-biphenyl-4-yl-imidazo [1,2-a] pyridine-3-yl)-3-(4-nitro-phenyl)-oxazolidin-5-one (BIPNO5)] was examined as an corrosion inhibitor for carbon steel surface. Quantum mechanical method of Density Functional Theory (DFT) with (B3LYP (6-311++G (2d, 2p)) level of theory was used to calculate the minimize structure, physical properties and inhibition chemical parameters, in vacuum and two solvents (DMSO and H2O), all at equilibrium geometry. The results indicated that the new derivative could adsorb on the surface of carbon steel through the heteroatom, showing that the new inhibitor has good corrosion inhibition performance.
A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc
... Show MoreThis paper aims at the analytical level to know the security topics that were used with data journalism, and the expression methods used in the statements of the Security Media Cell, as well as to identify the means of clarification used in data journalism. About the Security Media Cell, and the methods preferred by the public in presenting press releases, especially determining the strength of the respondents' attitude towards the data issued by the Security Media Cell. On the Security Media Cell, while the field study included the distribution of a questionnaire to the public of Baghdad Governorate. The study reached several results, the most important of which is the interest of the security media cell in presenting its data in differ
... Show MoreThe reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer
The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .
The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.
The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin
... Show MoreThis study aims to derive a sustainable human development index for the Arab countries by using the principal components analysis, which can help in reducing the number of data in the case of multiple variables. This can be relied upon in the interpretation and tracking sustainable human development in the Arab countries in the view of the multiplicity of sustainable human development indicators and its huge data, beside the heterogeneity of countries in a range of characteristics associated with indicators of sustainable human development such as area, population, and economic activity. The study attempted to use the available data to the selected Arab countries for the recent years. This study concluded that a single inde
... Show MoreThis is a contribution to study the situation of a dwelling of previous case of kala- azar in the endemic area (AL-Mahmodiya/ AL-Rasheed district) about 25 km south of Baghdad. In order to assess the possible ecological causes of the incidence and the prevalence of visceral leishmaniasis, in one of the well-known foci of the disease in the central region of Iraq. It was found that the human dwelling position and ecological factors affect the infection with this disease.
The inhibitive action of polyvinyl alcohol –sodium nitrite (PVASN) composite on the corrosion of mild steel in simulated cooling water (SCW) has been investigated by weight loss and potentiodynamic polarization. The effect of composite concentration (PVA/SN) , pH, and exposure time on corrosion rate of mild steel were verified using 2 levels factorial design and surface response analysis through weight loss approach, while the electrochemical measurements were used to study the behavior of mild steel in (SCW) with pH between 6 and 8 and in absence and presence of (PVA) in solution containing different concentration of NaNO2. It was verified that all three main variables studied were statistically significant while their interaction is
... Show MoreAbstract
This research aims to develop a unit as part of a sixth-grade Arabic language textbook and measure its effectiveness in the development of twenty-first-century skills of female students. The author adopted the experimental approach with a quasi-experimental design of the pre-post single-group. A list of the major skills was derived from the framework for the 21st-century skills of the mother tongue that was developed by the Partnership for 21st-Century Skills and reviewed and adjusted by some specialists. According to their views, the unit was developed. The study targeted 15 sub-skills falling under three main skills. The results of the study showed the effectiveness of the developed unit in the develo
... Show MoreObjective: To find out any gender differences in health promoting behaviors for a sample of students attending Institute of Technology/ Baquba. Methodology: An analytical, cross-sectional study conducted randomly for a sample of students attending Technical Institute/ Baquba, during the period from 10th November 2015 to 10th April 2016. A questionnaire used to collecting data, this questionnaire was consisted from two domains related to health promoting behaviors including (Dietary domain and domain of some daily life activities like sleep duration, rise time, bedtime and walking period per week). The