Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Abstract
Praise be to Allah, The Lord of the worlds, and peace be upon
Muhammad the master of former and latter people, and peace be upon His
relatives, companions and those who followed Him to Judgment day.
After recognizing the prescription which is called (Al- Fadhaly's Thesis in
parsing of "There is no god but God") as it is related with the word of the
investigation of this issue attracted me, as being related with the idea of the
only one God that is mentioned in the prophetic speech, which is said by
Anas- God satisfies him- Who said, Said the Messenger Muhammad peace
be upon him " Goes out of the Hell who said: there is no god but God, and in
his heart a hair weight of charity, and goes out of the He
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MoreThe research aims to identify the relationship between employing future skills during teaching from the viewpoint of students of Islamic studies at the Northern Border University, as well as their attitudes towards future professions. The researcher employed the correlational descriptive approach. The tools were a questionnaire for employing future skills, and a scale for the attitude towards the future profession. The two research tools were applied to a random sample of (242) male and female students from the department of Islamic Studies, College of Education and Arts. The findings showed that the total level of employing future skills and their three axes during teaching was average. It was also found that the attitude towards future
... Show MoreAn experiment in the semester, the second semester of the academic year (2022-2023), and the data used was not processed (the second test for two independent, inaccurate samples, the Bermon correlation coefficient, and the Spearman correlation coefficient), and the following results were reached: There is a statistically significant difference at the level of ( 0) average, 05) between the third grade who studied the plan for asking cluster questions, and between the average of those who studied the special feature according to the traditional method of selecting achievement, and enjoyed completing the specialization, choosing the experimental group, because the strategy of asking cluster questions is one of the externalities that... Lear
... Show MoreAugmented reality technology is a modern technique used in all fields, including: medicine, engineering and education, and has received attention from officials in the educational process at present; The focus of this research is on the degree of use of augmented reality among field experience students in the project's optimal investment program for teaching staff and their difficulties, applied to a sample of 75 students, through a questionnaire prepared by the researcher as a tool to determine the degree of use, as well as difficulties. The researcher addressed the subject through two main axes to determine the degree of use, as well as the difficulties preventing teachers and learners from using this technique. The results of the rese
... Show MoreIn this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion
... Show MoreIn this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and
... Show MoreThe ligand 4-(2-aminmo-5-nitro-phenylazo)-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one derived from 4-aminoantipyrine and 4-nitroaniline was synthesized. The synthesized ligand was characterized by 1HNMR, FT-IR, UV-Vis spectra and (C.H.N) analysis. Complexes of (YIII and LaIII ) with the ligand were prepared in aqueous ethanol with a 1:2 M:L ratio and at optimum pH. The prepared complexes were characterized by using flame atomic absorption, FT-IR, UV-Vis spectra,(C.H.N) analysis and conductivity measurement. The stoichiometry of complexes was studied by the mole ratio and job methods. A concentration range (1×10-4 - 3×10-4 M) obeyed Beer's law, the complex solutions show high values of molar absorption. On the basis of physicochemical
... Show More