Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.
Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreAssimilation is defined ,by many phoneticians like Schane ,Roach ,and many others, as a phonological process when there is a change of one sound into another because of neighboring sounds.This study investigates the phoneme assimilation as a phonological process in English and Arabic and it is concerned specifically with the differences and similarities in both languages. Actually ,this study reflects the different terms which are used in Arabic to refer to this phenomenon and in this way it shows whether the term 'assimilation ' can have the same meaning of 'idgham' in Arabic or not . Besides, in Arabic , this phenomenon is discussed from&nb
... Show MoreIn Iraq, more than 1031 school projects have been halted due to disputes and claims resulting from financial, contractual, or other issues. This research aims to identify, prioritize, and allocate the most critical risk factors that threaten these projects’ success for the duration (2017-2022). Based on a multi-step methodology developed through systematic literature reviews, realistic case studies, and semi-structured interviews, 47 risk factors were identified. Based on 153 verified responses, the survey reveals that the top-ranked risk factors are corruption and bribery, delaying the payments of the financial dues to the contractors or sub-contractors, absence of risk management strategy, multiple change orders due
... Show MoreOlanzapine (OLZ) is classified as a typical antipsychotic drug utilized for the treatment of schizophrenia. Its oral bioavailability is 60% due to its low solubility and pre-systemic metabolism. Hence, the present work aims to formulate and evaluate OLZ nanoparticles dissolving microneedles (MNs) for transdermal delivery to overcome the problems associated with drug administration orally. OLZ nanoparticles were prepared by the nanoprecipitation method. The optimized OLZ nanoparticle formula was utilized for the fabrication of dissolving MNs by loading OLZ nanodispersion into polydimethylsiloxane (PDMS) micromould cavities, followed by casting the polymeric solution of polyvinylpyrrolidone(PVP-K30) and polyvinyl alcohol (PVA) to form
... Show MoreThis research aim to exploring the positive psychological capital concept (PsyCap) which drawn from positive psychology and applying it at workplace. PsyCap emerged as extending for recent another types of capital, such as human capital and social capital. It has been defined as “an individual’s positive psychological state of development". The PsyCap consist of four core constructs (self- efficacy, optimism, hope, and resilience). Each of the four components has considerable theorizing and researching that can contribute to developing an integrative theoretical foundation for PsyCap. But their combined motivational effects will be broader and more impactful than any one of t
... Show MoreA simple analytical method was used in the present work for the simultaneous quantification of Ciprofloxacin and Isoniazid in pharmaceutical preparations. UV-Visible spectrophotometry has been applied to quantify these compounds in pure and mixture solutions using the first-order derivative method. The method depends on the first derivative spectrophotometry using zero-cross, peak to baseline, peak to peak and peak area measurements. Good linearity was shown in the concentration range of 2 to 24 μg∙mL-1 for Ciprofloxacin and 2 to 22 μg∙mL-1 for Isoniazid in the mixture, and the correlation coefficients were 0.9990 and 0.9989 respectively using peak area mode. The limits of detection (LOD) and limits of quantification (LOQ) wer
... Show MoreThe present study describes employing zero-, 1st - and 2nd -order derivative spectrophotometric methods have been developed for determination of lorazepam (LORA) and clonazepam (CLON) in commercially available tablets. LORA was determined by means of 1st (D1), 2nd (D2) derivative spectrophotometric techniques using zero cross, peak height, and Peak area. D1 used for the determination of CLON by using zero cross and peak height while D2 (zero cross) was used for the determination of CLON. The method was established to be linear in concentration containing different ratios of LORA and CLON range of (20-200 mg/L) and (5-35 mg/L) at wavelength range (250 -370 nm), (210-370nm) respectively. The proposed techniques are highly sensitive, precise a
... Show More