Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The ligand 4-(2-aminmo-5-nitro-phenylazo)-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one derived from 4-aminoantipyrine and 4-nitroaniline was synthesized. The synthesized ligand was characterized by 1HNMR, FT-IR, UV-Vis spectra and (C.H.N) analysis. Complexes of (YIII and LaIII ) with the ligand were prepared in aqueous ethanol with a 1:2 M:L ratio and at optimum pH. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis spectra,(C.H.N) analysis and conductivity measurement. The stoichiometry of complexes was studied by the mole ratio and job methods. A concentration range (1×10-4 - 3×10-4 M) obeyed Beer's law, the complex solutions show high values of molar absorption. On the basis of physicochemical
... Show MoreThis research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MoreThis paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.
It is no secret to anyone that studying and investigating books of jurisprudence, despite their suffering, is a pleasure that cannot be compared to pleasure, and it has benefits and importance that cannot be limited and summed up, and it has great fruits that researchers and students of knowledge reap, as well as enriching libraries with jurisprudential material, after dusting them and taking them out to the light of libraries to be seen. Researchers and scholars, generation after generation, so that this nation can benefit from this pioneering intellectual and scientific product that was written for us by our first ancestors of working scholars who enriched human civilization with this scientific material, which has become a beacon guid
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreThis study aimed to manufacture an innovative device that enables the player to walk after the operation and improves the functional efficiency through the improvement in the range of motion as well as the improvement in the size of the muscles working on the knee joint. The research, the study population consisted of players with severing the anterior cruciate ligament of the advanced soccer players, and the number of the research sample was (5) injured for the control sample and (5) for the experimental sample in Abu Ghraib Hospital and some rehabilitation centers for a period of six months, and the pre-tests were conducted after two weeks of The cruciate ligament surgery was performed, and the innovative device was used for the e
... Show MoreIntroduction: This study aimed to assess the color change of human teeth with artificial enamel white spot lesions (WSLs) after sandblasting with bioactive glass, resin infiltration, and microabrasion and to test color stability after pH cycling. Methods: Fifty extracted human mandibular first molars were randomly assigned into five groups: Sound, WSLs (untreated), and WSLs sandblasted with bioactive glass (Sylc), WSLs treated by resin infiltration (ICON), and WSLs treated by microabrasion (Opalustre), respectively. All specimens underwent a pH cycling procedure. The color parameters for each specimen were assessed using an Easyshade dental spectrophotometer at different time stages then the color changes (ΔE) were calculated. Results: The
... Show MoreA newly developed FIA-merging zones spectrophotometric system, the method is rapid, accurate and sensitive for metformin hydrochloride determination through the oxidation of 1- naphthol by sodium hypochlorite and coupling with metformin.HCl in the presence of sodium hydroxide to form a blue soluble ion pair and this product was determined using homemade CFIA-Merging zones techniques , at 580 nm. Data treatment shows that linear range is (0.5-35) µg/ ml. The optimization conditions for various chemical and physical conditions of [MTF- NaOCl-α-naphthol-NaOH] system were investigated. The LOD was 0.01µg / ml and LOQ 0.1µg/ml from the lowest concentration of the calibration graph with r2% 99.18 and RSD% did
... Show MoreThe audit profession today gets an increasing interest by the financial , economic and legal contemporary societies , because of the importance of the technical & neutral auditor’s opinion to the financial reports beneficiaries in order to enable them making their investment decisions , but some of them whom suffered damage or loss when they made that decisions according to the mentioned financial statements which consolidated with auditor’s report , exposed the function to a responsibility and credibility crisis in addition to missing the trust especially at the latest years. They always ask why or what is the reason that cause the auditor didn’t giving us any warning signs about the economic mater for that companies.