Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Background: The isatin molecule is present in many natural substances, including plants and animals, and is used to prepare compounds with various biological activities. Objectives: To synthesize a new series of isatin derivatives with the expectation that they will have antimicrobial activity. Methods: Thiazole Schiff bases were synthesized from various Mannich bases of isatin to evaluate their antimicrobial properties. Initially, Mannich bases (2a–e) were synthesized by reacting isatin with formaldehyde and different secondary amines. Subsequently, they were treated with 2-aminothiazole to yield the final compounds (3a–e). Spectroscopic characterization was done via FT-IR and 1H-NMR. The antimicrobial screening was conducted o
... Show MoreThe azo Schiff base [Reaction of 4-aminoanypyrine and P-hydroxy acetophenone] and O-Phenylene diamine have been prepared. One azo Schiff base chelate of Co(Il), Ni(II), Cu(II) and Zn(II)ion was also prepared. The chemical frameworks of the azo Schiff base and like elemental analyses (CHN), determinations of molar conductance, 1 H &13C NMR, IR mass and electronic spectroscopy .The elemental analyses exhibited the combination of [L: M] 1:1 ratio. Established on the values IR spectral, it is showed that the azo Schiff base compound acts as neutral hexadentate ligand bonded with the metal ion from two hydroxyl, two azomethine and two azo groups of the azo Schiff base compound in chelation was confirmed by IR , 1Hand 13CNMR spectral outco
... Show MoreThe paper is concerned with the state and proof of the existence theorem of a unique solution (state vector) of couple nonlinear hyperbolic equations (CNLHEQS) via the Galerkin method (GM) with the Aubin theorem. When the continuous classical boundary control vector (CCBCV) is known, the theorem of existence a CCBOCV with equality and inequality state vector constraints (EIESVC) is stated and proved, the existence theorem of a unique solution of the adjoint couple equations (ADCEQS) associated with the state equations is studied. The Frcéhet derivative derivation of the "Hamiltonian" is obtained. Finally the necessary theorem (necessary conditions "NCs") and the sufficient theorem (sufficient conditions" SCs") for optimality of the stat
... Show MoreThe annealing temperature (200–500 °C) effects of optical frequency response on the dielectric functions of sol–gel derived CuCoO
This paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee
... Show MoreA reinforced concrete frame is referred as "RIGID FRAMES". However, researches indicate that the Beam-Column joint (BCJ) is definitely not rigid. In addition, extensive research shows that failure may occur at the joint instead of in the beam or the column. Joint failure is known to be a catastrophic type which is difficult to repair.
This study was carried out to investigate the effect of hoops and column axial load on the shear strength of high-strength fiber reinforced Beam-Column Joints by using a numerical model based on finite element method using computer program ANSYS (Version 11.0). The variables are: diameter of hoops and magnitude of column axial load.
The theoretical results obtained from ANSYS program are in a good a
Near surface mounted (NSM) carbon fibers reinforced polymer (CFRP) reinforcement is one of the techniques for reinforcing masonry structures and is considered to provide significant advantages. This paper is composed of two parts. The first part presents the experimental study of brick masonry walls reinforced with NSM CFRP strips under combined shear-compression loads. Masonry walls have been tested under vertical compression, with different bed joint orientations 90° and 45° relative to the loading direction. Different reinforcement orientations were used including vertical, horizontal, and a combination of both sides of the wall. The second part of this paper comprises a numerical analysis of unreinforced brick masonry (URM) wa
... Show More