Preferred Language
Articles
/
HhYSr4oBVTCNdQwCj6MG
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Diagenetic Features and Porosity Development for Hartha Formation in the Balad and East Baghdad Oil Fields, Central Iraq
...Show More Authors

     The Hartha Formation (age Late Campanian – Early Maastrichtian) is considered an important oil reservoir in Iraq. The petrography and the diagenetic features were determined based on the analyses of 430 thin sections from selected wells within Balad and East Baghdad oil fields, Ba-2, Ba-3, EB-53, Eb-56 and EB-102.

The most important and common diagenesis processes that affect Hartha Formation include Cementation, Neomorphsim, Micrtitization, Dolomitization, Compaction, Dissolution, and Authigenic minerals. This diagenesis deformation on Hartha Formation has overall accentuated the reservoir quality heterogeneity.

The reservoir quality evolution is affected by destruction by grain compaction mechanical and chemica

... Show More
View Publication
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
World Economics & Finance Bulletin (wefb)
ANALYSIS AND MEASUREMENT THE CONCURRENT FINANCIAL AND ECONOMIC CYCLE IN THE IRAQI ECONOMY FOR THE PERIOD 1990-2018
...Show More Authors

The research aims to verify the presence of correlation between the financial cycle and the economic cycle in the Iraqi economy. During the research period, the Iraqi economy witnessed a crisis cycle due to the permanent deviations in the state budget and the occurrence of sustainable deficits during the period of the economic blockade with the coincidence of an inflationary economic cycle due to the cheap money policy and the occurrence of Negative supply shocks due to the blockade and the madly high general level of prices, in addition to the weak financial planning of the state budget during the post-economic blockade and the entry of the economy into a stagnant economic cycle due to security and political instability, low levels of priv

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
DAMAGE DETECTION AND LOCATION FOR IN AND OUT-OFPLANE CURVED BEAMS USING FUZZY LOGIC BASED ON FREQUENCY DIFFERENCE
...Show More Authors

In this study, structures damage identification method based on changes in the dynamic characteristics
(frequencies) of the structure are examined, stiffness as well as mass matrices of the curved
(in and out-of-plane vibration) beam elements is formulated using Hamilton's principle. Each node
of both of them possesses seven degrees of freedom including the warping degree of freedom. The
curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory
in 1994. A computer program was developing to carry out free vibration analyses of the curved
beam as well as straight beam. Comparing with the frequencies for other researchers using the general
purpose program MATLAB. Fuzzy logic syste

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Apr 24 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Use of Acidic Hydrolysis and Diazo Coupling Reaction for Spectrophotometric Determination of Furosemide in Urine and Pharmaceutical Formulation.
...Show More Authors

     Simple and rapid spectrophotometric determination of furosemide (FUR) has been investigated .The method is based on acid hydrolysis of FUR to free primary aromatic amine and diazotization followed by coupling with 3, 5 di methyl phenol (3, 5-DMPH) at basic medium. The absorbance was measured at 434 nm, the method was optimized for best condition, and beers’ law is obeyed over the range of 0.4-50 µg.mL-1 with molar absorptivity and sandal’s sensitivity 1.3899 x104 L moL-1 .cm-1 and 0.0238x104 µg.cm-2 respectively. Analysis of solution containing nineteen different concentrations of FUR gave a correlation coefficient of (0.9999) a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
Student Attitudes towards Rooting the Educational Administration Field: A Field Study for Phd Students in the Department of Educational Administration at Umm al-Qura University
...Show More Authors

The study sought to identify the attitudes of PhD students towards establishing the field of educational administration. The study followed the descriptive survey method. The questionnaire was used to collect information from the study community consisting of (95) male and female students in the department of educational administration and Planning. Among the most important results about students ’attitudes towards establishing the educational administration field are the following: 1) identifying the necessity of establishing the educational administration field. 2) Encouraging students to attend seminars and scientific conferences in Islamic rooting. 3) there are no statistically significant differences in the attitudes of doctoral s

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 20 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of Auditors the Islamic Financial Engineering tool for Assessing Funding Risk Management in Islamic Banks: Applied research on a sample of Islamic banks
...Show More Authors

Experience the Islamic financial industry faces many challenges, most notably the lack of proper risk management tools that meet the requirements of legality and economic efficiency advantage from another side, so it requires the search for innovative ways to manage the risk of Islamic banking, Islamic finance industry is manufacture up-to-date, if compared with the financial industry (traditional), which increases the problematic of risk management in the Islamic financial industry nature of treatment which should be compatible with Islamic law, as well as economic efficiency, thereby Progress came the importance of research to highlight the entrance to Islamic financial engineering and the goals sought to be achieved through the use of

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The role of the green human resources management practices in a achieving requirements of environmental citizenship- Field research at the General Company for Vegetable Oils.
...Show More Authors

The research aims to determine the role of the practices of green human resources management in achieving requirements of environmental citizenship in the workplace, the General Company for Vegetable Oils was chosen for the application of field-side of research which represent one of the important industrial companies in Iraq, which suffers from poor Green human resources management applications, which reflected negatively on the development Environmental citizenship among Employees. The questionnaire use as a tool to collect data and information as well as field presence of the researcher, The research sample included (30) managers of departments and Division ,and through using statistical program (SPSS) the data has been analys

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 02 2024
Journal Name
International Development Planning Review
THE EFFECT OF EXERCISES USING A MINI SQUASH COURT ON IMPROVING SOME MOTOR ABILITIES AND LEARNING SOME BASIC SKILLS FOR PLAYERS AGED 10-12 YEARS
...Show More Authors