Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The way used to estimate the fuzzy reliability differs according to the nature of the information of failure time which has been dealt in this research.The information of failure times has no probable distribution to explain it , in addition it has fuzzy quality.The research includes fuzzy reliability estimation of three periods ,the first one from 1986 to 2013,the second one from 2013 to 2033 while the third one from 2033 to 2066 .Four failure time have been chosen to identify the membership function of fuzzy trapezoid represented in the pervious years after taking in consideration the estimation of most researchers, proffional geologists and the technician who is incharge of maintaining of Mosul Dam project. B
... Show More(Thimma) in Arabic means compact, and immunity. (People of Thimma) are the free non-Muslim people under Muslim rule. This includes Heavenly Religions people, i. e., Christian and Jews).
They have been called (People of Thimma) because they had paid (Jizyah: tribute) so they became safe for their souls, honor, properties at the custody of Muslims.
Islamic law had posed (Jizyah: tribute) upon the Jews and Christians who were living under Muslim rule as a reaction of not embracing Islam Faith against securing their rights and freedom.
Freedoms secured by Islam for the (People of Thimma) had been many, including the right of faith, not coercing them to be Muslim, the right to live, to possess properties, protect and secure them, the
High temperature superconductors materials with composition Bi1.6-xSbxPb0.4Sr2Ca2-yCdyCu3OZ (x = 0, 0.1, 0.2 and 0.3) and (y = 0.01 and 0.02), were prepared by using the chemical reaction in solid-state ways, and test influence of partial replacement of Bi and Ca with Sb and Cd respectively on the superconducting properties, all samples were sintered at the same temperature (850 oC) and for the same time (195 h). The structural analysis of the prepared samples was carried out using X-ray diffraction (XRD) measurements performed at room temperature, scanning electron microscope (SEM) and dc electrical resistivity was measured as a function of temperature. It was found that the sample prepared by partial substitution of Sb at ratio (x= 0.2
... Show MoreThe effect of fiber volume fraction of the carbon fiber on the thermal conductivity of the polymer composite material was studied. Different percentages of carbon fibers were used (5%, 10%, 15%, 20%, and 25%). Specimens were made in two groups for unsaturated polyester as a matrix and carbon fibers, first group has parallel arrangement of fibers and the second group has perpendicular arrangement of fibers on the thermal flow, Lee's disk method was used for testing the specimens. This study showed that the values of the of thermal conductivity of the specimens when the fibers arranged in parallel direction was higher than that when the fibers arranged in the perpendicular direction
 
... Show MoreAccording to the extraction procedure , Eucalyptus incrassata leave sample yielded 5% and 2% w/w(Based on dry leaves ) of the aqueous extract and essential oils respectively. Disk diffusion method was used to determine the antimicrobial activity of aqueous extract and essential oils of E . incrassata leaves against eight isolates of multidrug- resistant of Staphylococcus aureus ( S. aureus) . It was found that aqueous extract and essential oils have variable antimicrobial activity(the inhibition zone diameter ranged from 7 to 14 mm respectively ) , while essential oils showed more effect than aqueous extract . It was noticed that values of Minimal Inhibitory Concentration ( MIC ) for
... Show MoreTin dioxide doped silver oxide thin films with different x content (0, 0.03, 0.05, 0.07) have been prepared by pulse laser deposition technique (PLD) at room temperatures (RT). The effect of doping concentration on the structural and electrical properties of the films were studied. Atomic Force Measurement (AFM) measurements found that the average value of grain size for all films at RT decrease with increasing of AgO content. While an average roughness values increase with increasing x content. The electrical properties of these films were studied with different x content. The D.C conductivity for all films increases with increasing x content. Also, it found that activation energies decrease with increasing of AgO content for all films.
... Show MoreThis study aims to propose a novel research model to test the nexus between green human resource management processes, strategic excellence and the sustainability of educational institutions in Iraqi academic settings.
This examination in Iraqi higher education is finalised across three key stages: determining the knowledge gaps, reviewing the literature and building the hypothesised conceptual model. A case study complemented by a quantitative methodology using Statistical Package for the Social Sciences (SPSS) and Analysis of Moment
Acute Respiratory Distress Syndrome (ARDS) is triggered by a variety of insults, such as bacterial and viral infections, including SARS-CoV-2, leading to high mortality. In the murine model of ARDS induced by Staphylococcal enterotoxin-B (SEB), our previous studies showed that while SEB triggered 100% mortality, treatment with Resveratrol (RES) completely prevented such mortality by attenuating inflammation in the lungs. In the current study, we investigated the metabolic profile of SEB-activated immune cells in the lungs following treatment with RES. RES-treated mice had higher expression of miR-100 in the lung mononuclear cells (MNCs), which targeted mTOR, leading to its decreased expression. Also, Single-cell RNA-seq (scRNA seq)
... Show MoreAs the prices of the fuel and power had fluctuated many times in the last decade and new policies appeared and signed by most of the world countries to eliminate global warming and environmental impact on the earth surface and humanity exciting, an urgent need appeared to develop the renewable energy harnessing technologies on the short-term and long-term and one of these promising technologies are the vertical axis wind turbines, and mostly the combined types. The purpose of the present work is to combine a cavity type Savonius with straight bladed Darrieus to eliminate the poor self-starting ability for Darrieus type and low performance for Savonius type and for this purpose, a three-bladed Darrieus type with symmetric
... Show More