Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
the sera levels of luteninizing hormone were investgaited prior tq surgery in 10 postmenopaisal women with benign and 10 postmenopausal women with maliganant healthy
This study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t
The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreThe research aims to study the entrepreneurial performance of the banks, according to the intelligence of competitive and strategic as the entrepreneurial performance is the one who does not stand the benefits of excellence in accomplished when just achieving the bank's objectives planned, but exceed it down to creativity in accomplishing these goals in a manner leads to making a entrepreneurial bank in the markets and the focus the eyes of competitors and the banks and other Following his example.
Was chosen the subject of research and strategic intelligence and competitive because of its impact on the strategic success of the banking sector, the fact is the entrepreneurial in the Iraqi banking mar
... Show MoreThe present work deals with the performance of screw piles constructed in gypseous soil of medium relative density; such piles are extensively used in piles foundations supported structures subjected to axial forces. The carrying capacity and settlement of a single screw pile model of several diameters (20, 30, and 40) mm inserted in gypseous soil is investigated in the present study. The gypsum content of soil used in tests was 40%. The bedding soil used in tests was prepared by raining technique with a relative density of 40%. A physical model was manufactured to demonstrate the tests in the laboratory. The model of screw pile has been manufactured of steel with a total length of 50
Infertilityis oneuof the most problemsathatufacingaadvancedunations. In the general, about halfof allacasesaof the infertility are causedby factors thaturelated toathe male partner. Propos educausesvofumalev infertility include evgeneticuand environmental factors. Blood samples from 64 infertileumen allawere living in urban its al-Fallujah city (30 azospermeiauand 34 oligospermeia) and 32 fertile men (asuthe control group) were collected. Heavy metal concentrations inusera of infertile and fertile groupswereumeasured by using Atomic Absorption Spectrophotometer. Y- chromosomemicrodeletions were detected by using PCR techniques. Significantdifferences (P?0.05)uin the concentration ofucopper (0.0267±0.0147 and 0.0278±0.0273, for inf
... Show MoreA potentiostatic study of the behaviour of Inconel (600) in molar sulphuric acid has been carried out over the temperature range 293-313 K. Values have been established for the potentials and current densities of the corrosion, active-passive transition, passivity and transpassive states. For corrosion, the current density (ic) and potential (Ec) have been determined from well-defined Tafel lines. The potential and current density prior to the commencement of passivity have been obtained corresponding respectively to the critical potential (Ecr( and to the current density (icr) for the active-passive transition state. The passive range was defined by the respective potentials and current densities for passive film formation and dissolutio
... Show MorePerhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec
... Show More