Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
This research addresses the relevance of men and women and the consequent provisions
such as dowry and alimony ... Of the like, marriage is to organize links masculinity and
femininity any sexual meeting between men and women a special system that must be
produces reproduction him and alone, which gets its reproduction in human kind, and has no
family and on the basis of private life is being organized.
The importance of the topic see Islam has urged marriage and forbade celibacy, and ensure
that the Lord of Glory Almighty married subsidy nor the origin of the differences between
men and women in money or workmanship or blue-chip Every Muslim inept any Muslim and
every Muslim efficient for any Muslim.
The impor
A numerical investigation has been performed to study the effect of eccentricity on unsteady state, laminar aiding mixed convection in a horizontal concentric and eccentric cylindrical annulus. The outer cylinder was kept at a constant temperature
while the inner cylinder was heated with constant heat flux. The study involved numerical solution of transient momentum (Navier-Stokes) and energy equation using finite difference method (FDM), where the body fitted coordinate system (BFC) was
used to generate the grid mesh for computational plane. The governing equations were transformed to the vorticity-stream function formula as for momentum equations and to the temperature and stream function for energy equation.
A computer progra
It is more beneficial science and created and the highest honor is the Koran Sciences, God has honored research in this fun science, came this research that shed the light on the radical incision, and Naughty derivatives as contained in the Koran, and illustrate the diversity of Saghma morphological, and fork them from derivatives what it entailed connotations, as well as the evacuation of cryptic in some of these verses from the biological secrets take minds newly exposed Anitrjt science under the name of scientific miracles.
The research methodology is revenue verse which included the word, and revenue lexical meaning and its meaning in the context of the Qur'an, and reflect the views of the commentators of the verse, and then the r
In computer vision, visual object tracking is a significant task for monitoring
applications. Tracking of object type is a matching trouble. In object tracking, one
main difficulty is to select features and build models which are convenient for
distinguishing and tracing the target. The suggested system for continuous features
descriptor and matching in video has three steps. Firstly, apply wavelet transform on
image using Haar filter. Secondly interest points were detected from wavelet image
using features from accelerated segment test (FAST) corner detection. Thirdly those
points were descripted using Speeded Up Robust Features (SURF). The algorithm
of Speeded Up Robust Features (SURF) has been employed and impl
Objective: Evaluation the national standards for exposure to chemical materials and dusts in The State
Company for Drugs Industry in Samarra.
Methodology: A descriptive evaluation design is employed through the present study from 25th May 2011
to 30th November 2011 in order to evaluate the national standards for exposure chemical materials and dusts
in The State Company for Drugs Industry in Samarra. A purposive (non-probability) sample is selected for the
study which includes (110) workers from the State Company for Drugs Industry in Samarra. Data were
gathered through the workers` interviewed according to the nature of work that they perform. The evaluation
questionnaire comprised of three parts which include the w
The study of sex Structure and age characteristics of an important element of the
follow-up changes between different population groups, which are connected to a large degree
the demographic, social and economic characteristics, particularly since each population
group varying characteristics in terms of age, sex entail social, demographic, cultural and
economic implications, and from that the researcher has taken from Structure of sex and age
for population in the district of Tuz Khurmatu for (1997-2012 ) the subject of consideration
and maintain compared to see the contrast between them. Qualitative Research for installation
and the age of the urban and rural areas has touched the judiciary, as well as its respects
The OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extr
... Show MoreThe OpenStreetMap (OSM) project aims to establish a free geospatial database for the entire world which is editable by international volunteers. The OSM database contains a wide range of different types of geographical data and characteristics, including highways, buildings, and land use regions. The varying scientific backgrounds of the volunteers can affect the quality of the spatial data that is produced and shared on the internet as an OSM dataset. This study aims to compare the completeness and attribute accuracy of the OSM road networks with the data supplied by a digitizing process for areas in the Baghdad and Thi-Qar governorates. The analyses are primarily based on calculating the portion of the commission (extra road) and
... Show MoreThe study intends to interpretation of well logs to determine the petrophysical parameters for Khasib, Tanuma, and Sa'di formations in Halfaya Oil Field. Where this field is located 30 kilometers south-east of the Amara city and it is considered as one of the important fields in Iraq because of the high production of oil, because Khasib, Tanuma, and Sa'di are f carbonates reservoirs formations and important after the Mishrif Formation because of the lack of thickness of the formations compared to the amount of oil production. The Matrix Identification (MID) and the M-N crossplot were used to determine the lithology and mineralogy of the formations; through the diagrm it was found the three formations consisted mainly of calcite with some
... Show More