Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The charge density distributions of 10 B nucleus are calculated using the
harmonic oscillator wave functions. Elastic and inelastic electron scattering
longitudinal form factors have been calculated for the similar parity states of 10B
nucleus where a core of 4He is assumed and the remaining particles are
distributed over 3/ 2 1p and 1/ 2 1p orbits which form the model space.
Core-polarization effects are taken into account. Core-polarization effects are
calculated by using Tassie model and gives good agreement with the measured
data.
A new benzylidene derivative, namely N-benzylidene-5-phenyl-1,3,4-thiadiazol-2-amine (BPTA), has been synthesized and instrumentally confirmed with Elemental Analysis (CHN), Nuclear Magnetic Resonance (NMR), and Fourier Transform Infrared Spectroscopy (FT-IR). Titanium Dioxide (TiO2) nanoparticles (NPs) were synthesized and characterized by X-ray. The mutualistic complementary dependence of BPTA with TiO2 nanoparticles as anti-corrosive inhibitor on mild steel (MS) in 1.0 M hydrochloric acid has been tested at various concentrations and various temperatures. The methodological work was achieved by gravimetric measurement methods complemented with surface analysis. The synthesized inhibitor concentrations were 0.1 mM to 0.5 mM and the temper
... Show MoreAbstract
This work is considered the first study for the components of the Iraqi Leucaena leucocephala plant, where the different phytochemical compounds that present in the aerial parts were identified by using the gas chromatography/mass spectrometry technique (GC/MS). The type of the components and their concentration will differ according to the part of the plant used and the method of extraction (hot and cold). This study made a comparison in lupeol concentration that was identified and isolated from petroleum ether fractions of Leucaena leucocephala by using Gas Chromatography/Mass Spectrometry (GC/MS), High-performance thin-layer chromatography (HPTLC), and Preparative High-Performance Li
... Show MoreAn experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show MoreBackground. Endodontic infections caused by remaining biofilm following disinfection with chemical fluids encourage secondary bacterial infection; hence, employing laser pulses to activate the fluids is advised to improve microbial biofilm clearance. This study investigated the performance of Er,Cr:YSGG laser in photon-induced photoacoustic streaming (PIPS) agitation of 5.25% sodium hypochlorite (NaOCl) to enhance the removal of mature Enterococcus faecalis (E. faecalis) biofilms in complex root canal systems. Methods. The mesial roots of the lower first and second molars were separated and inoculated with E. faecalis bacteria for 30 days. The roots were irrigated with 5.25% NaOCl, some of them were agitated with passive ultrasonic
... Show MoreBackground: The isthmus is a difficult area in the root canal complex to manage. The research aimed to evaluate the efficiency of three different obturation techniques (lateral condensation, EandQ (thermoplasticized gutta percha system) and Soft Core (thermoplasticized core carrier gutta percha system)) to obturate the isthmus area of roots prepared by two different instrumentation techniques (rotary ProTaper universal and ProTaper Next systems). Material and method: Sixty freshly extracted teeth were randomly divided into two main groups (A and B) of 30 teeth each. Group A was prepared by rotary ProTaper Universal whereas group B was prepared by ProTaper Next system. Each main group was then randomly subdivided into three subgroups of 10 t
... Show MoreCurrently, there is no established of e-waste treatment in Thi- Qar province, while their creating is increasing every year. It has been well- known that e-waste is a source of environmental degrading and their placement in landfills increases the irreversible climate change. A research model has been developed to link three components: coercive pressure, normative influence, and mimicry, then study their effect on e-waste adopt and continuance intentions. The model was validated using data collected from a field survey of 92 managers of small enterprises in Thi-Qar province. A questionnaire was developed to collect data. It contains five major variables, exemplify by fourteen items. Als
... Show MoreThis study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show More