Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The Hartha Formation (age Late Campanian – Early Maastrichtian) is considered an important oil reservoir in Iraq. The petrography and the diagenetic features were determined based on the analyses of 430 thin sections from selected wells within Balad and East Baghdad oil fields, Ba-2, Ba-3, EB-53, Eb-56 and EB-102.
The most important and common diagenesis processes that affect Hartha Formation include Cementation, Neomorphsim, Micrtitization, Dolomitization, Compaction, Dissolution, and Authigenic minerals. This diagenesis deformation on Hartha Formation has overall accentuated the reservoir quality heterogeneity.
The reservoir quality evolution is affected by destruction by grain compaction mechanical and chemica
... Show MoreThe research aims to verify the presence of correlation between the financial cycle and the economic cycle in the Iraqi economy. During the research period, the Iraqi economy witnessed a crisis cycle due to the permanent deviations in the state budget and the occurrence of sustainable deficits during the period of the economic blockade with the coincidence of an inflationary economic cycle due to the cheap money policy and the occurrence of Negative supply shocks due to the blockade and the madly high general level of prices, in addition to the weak financial planning of the state budget during the post-economic blockade and the entry of the economy into a stagnant economic cycle due to security and political instability, low levels of priv
... Show MoreIn this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste
Simple and rapid spectrophotometric determination of furosemide (FUR) has been investigated .The method is based on acid hydrolysis of FUR to free primary aromatic amine and diazotization followed by coupling with 3, 5 di methyl phenol (3, 5-DMPH) at basic medium. The absorbance was measured at 434 nm, the method was optimized for best condition, and beers’ law is obeyed over the range of 0.4-50 µg.mL-1 with molar absorptivity and sandal’s sensitivity 1.3899 x104 L moL-1 .cm-1 and 0.0238x104 µg.cm-2 respectively. Analysis of solution containing nineteen different concentrations of FUR gave a correlation coefficient of (0.9999) a
... Show MoreIn this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreThe study sought to identify the attitudes of PhD students towards establishing the field of educational administration. The study followed the descriptive survey method. The questionnaire was used to collect information from the study community consisting of (95) male and female students in the department of educational administration and Planning. Among the most important results about students ’attitudes towards establishing the educational administration field are the following: 1) identifying the necessity of establishing the educational administration field. 2) Encouraging students to attend seminars and scientific conferences in Islamic rooting. 3) there are no statistically significant differences in the attitudes of doctoral s
... Show MoreExperience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of
... Show MoreThe research aims to determine the role of the practices of green human resources management in achieving requirements of environmental citizenship in the workplace, the General Company for Vegetable Oils was chosen for the application of field-side of research which represent one of the important industrial companies in Iraq, which suffers from poor Green human resources management applications, which reflected negatively on the development Environmental citizenship among Employees. The questionnaire use as a tool to collect data and information as well as field presence of the researcher, The research sample included (30) managers of departments and Division ,and through using statistical program (SPSS) the data has been analys
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the