Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The aim of this work is to shed light on the importance of medicinal plants, especially those that have extracts that have a direct effect on human health. The study and identification of botany is necessary because human life has become closely linked to the life of plants as food . In addition to using plants as food, primitive man did not stop at this point, but rather developed their use to hunt prey and also used toxic plant materials in wars. With the passage of time, the ancient man was able to link the wild plants that cover the surface of the earth and the diseases that afflict him, so he used these plants or Parts of it are for treatment. A medicinal plant is defined as one or more of its parts that contain one or more che
... Show MoreThe aim of this work is to shed light on the importance of medicinal plants, especially those that have extracts that have a direct effect on human health. The study and identification of botany is necessary because human life has become closely linked to the life of plants as food. In addition to using plants as food, primitive man did not stop at this point, but rather developed their use to hunt prey and also used toxic plant materials in wars. With the passage of time, the ancient man was able to link the wild plants that cover the surface of the earth and the diseases that afflict him, so he used these plants or Parts of it are for treatment. A medicinal plant is defined as one or more of its parts that contain one or more chemicals in
... Show MoreSilica-based mesoporous materials are a class of porous materials with unique characteristics such as ordered pore structure, large surface area, and large pore volume. This review covers the different types of porous material (zeolite and mesoporous) and the physical properties of mesoporous materials that make them valuable in industry. Mesoporous materials can be divided into two groups: silica-based mesoporous materials and non-silica-based mesoporous materials. The most well-known family of silica-based mesoporous materials is the Mesoporous Molecular Sieves family, which attracts attention because of its beneficial properties. The family includes three members that are differentiated based on their pore arrangement. In this review,
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA t
... Show MoreStereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type b
... Show MoreThe influence of process speed (PS) and tillage depth (TD) , on growth of corn (Zea mays L) yield, for Maha cultivar, were tested at two ranges of PS of 2.483 and 4.011 km.hr-1, and three ranges of TD of 15,20 and 25cm. The experiments were conducted in a factorial experiment under complete randomized design with three replications. The results showed that the PS of 2.483 km.hr-1 was significantly better than the PS of 4.011km.hr-1 in all studied conditions. The , slippage ratio (SR) and the machine efficiency (ME), the physical soil characteristics represented by the soil density and porosity (SBD and TSP), and the plant characteristics represented the roots dry weight, PVI and the crop productivity (CP), except adjective of the fu
... Show MoreThe study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a
... Show MoreDeep learning has recently received a lot of attention as a feasible solution to a variety of artificial intelligence difficulties. Convolutional neural networks (CNNs) outperform other deep learning architectures in the application of object identification and recognition when compared to other machine learning methods. Speech recognition, pattern analysis, and image identification, all benefit from deep neural networks. When performing image operations on noisy images, such as fog removal or low light enhancement, image processing methods such as filtering or image enhancement are required. The study shows the effect of using Multi-scale deep learning Context Aggregation Network CAN on Bilateral Filtering Approximation (BFA) for d
... Show MoreIn this paper, we will focus to one of the recent applications of PU-algebras in the coding theory, namely the construction of codes by soft sets PU-valued functions. First, we shall introduce the notion of soft sets PU-valued functions on PU-algebra and investigate some of its related properties.Moreover, the codes generated by a soft sets PU-valued function are constructed and several examples are given. Furthermore, example with graphs of binary block code constructed from a soft sets PU-valued function is constructed.