Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Cyber security technology and the reflection of its application on the quality of financial reports: An exploratory study of a sample of internal and external auditors
...Show More Authors

Abstract

                 This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 06 2023
Journal Name
Journal Of Toxicology
Zinc Chloride Can Mitigate the Alterations in Metallothionein and Some Apoptotic Proteins Induced by Cadmium Chloride in Mice Hepatocytes: A Histological and Immunohistochemical Study
...Show More Authors

The heavy metal cadmium is extremely harmful to both humans and animals. Zinc supplementation protects the biological system and reduces cadmium-induced toxicity. This study aimed to determine whether zinc chloride (ZnCl2) could protect male mice with the damaged liver induced by cadmium chloride (CdCl2). The protective role of zinc chloride and expression of the metallothionein (MT), Ki-67, and Bcl-2 apoptotic proteins in hepatocytes were studied after subchronic exposure of mice to cadmium chloride for 21 days. Thirty male mice were randomly categorized into 6 groups (5 mice/group) as follows: a control group that did not receive any treatment, a group given ZnCl2 at 10 mg/kg alone, and two groups received ZnCl2 (10 mg/kg) i

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Oct 02 2020
Journal Name
Biochemical & Cellular Archives
Retinoids and rexinoids as vitamin A analogs.
...Show More Authors

Vitamin A, namely retinol is still the most proper agent for modulating so many biochemical reactions and biological functions in different tissues and organs. In addition to the provitamins A and α, βand γ-carotenoids that are present in various foods from either animal or plant origin, retinoids and rexinoids form the natural and synthetic analogs that are chemically related or unrelated and can be added as food supplements for deficiency disorders of vitamin A or used to alleviate or treat certain health problems such as skin carcinoma, acne, skin aging and dermatitis.

Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
Design and Evaluation of a Polarizer Filter
...Show More Authors

This research includes theoretical and evaluation design of a polarizer filter of high transmission in the near IR region of (900-1200nm) for different incidence angles to obtain a long wave and short wave pass filter using analytical calculations. Results refer to a new configuration design in fewer layers than used in previous studies in the long wave pass at incidence angles (45o,50o,55o). Adopted Hafnium dioxide (HfO2) and Magnesium fluoride (MgF2) as coating material at design wavelength (933nm), the study also included design short wave pass polarizer by using the same coating material.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2012
Journal Name
Journal Of Engineering
Design and Implementation of a Vlsm Simulator
...Show More Authors

Variable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required information (the

... Show More
Publication Date
Tue Aug 02 2022
Journal Name
Journal Of Legal Sciences
Jurisprudence and its controls - A Comparative study
...Show More Authors

Judicial jurisprudence is one of the important legal solutions to address the shortcomings of legislation. Throughout its long history, human societies have known many cases in which the judge finds himself facing a legislative vacuum in addition to civil legal texts that are difficult for the judge to implement due to ambiguity or contradiction, which requires diligence. To rule on resolving disputes before him in order not to deny justice, but the judge in his jurisprudence was not absolute, but rather bound by certain controls represented by observing the wisdom of legislation on the one hand and taking into account the nature of the texts on the other side, and from here this research came to shed light on the jurisprudence and its cont

... Show More
View Publication
Publication Date
Thu Sep 08 2022
Journal Name
Al-khwarizmi Engineering Journal
Design and Analysis of a Spraying Robot
...Show More Authors

An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
A comparison between Objective and subjective tests
...Show More Authors

This paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .

     The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.

     The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
Digital public relations and its role in prioritizing the masses: An analytical study of the United Nations website : (A paper extracted from a PhD dissertation)
...Show More Authors

This paper aims to identify how the United Nations works through its website in prioritizing audiences towards international issues، by identifying the digital PR mechanisms used in digital PR contents in prioritizing audiences towards the international issues they deal with. To achieve the objectives of this paper, the researcher used the survey method and content analysis tool with a view to identifying the ranking of international issues on the website of health، peace and security، humanitarian assistance، human rights، women، migrants، refugees and displaced persons، economic development، United Nations affairs، culture and education، environment and climate، sustainable development, and law and crime prevention. One of

... Show More
View Publication Preview PDF
Crossref