Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Recent decades have witnessed tremendous economic development that has led to the spread of international companies (multinational companies) and its activity has expanded to cover many countries of the world, with intense competition among countries to attract more international investments, which has led to the emergence of some controversial accounting issues in many Relevant areas, including accounting for transactions in foreign currencies, translation of financial statements for companies and foreign branches, as this issue is an important and sensitive topic because many of its aspects are controversial and not yet resolved, especially with regard to the variation in standards and Relevant accounting practices from one country to
... Show MoreThe study area soils suffer from several problems appear as tkhesvat and cracks in the roads and waterlogging which reduces the susceptibility of soil to withstand pressure, this study was conducted on the soil of the Karkh district based on field study that included (6) samples of soil physical analyses contain different ratios of (mud, sand, silt) as percentages (52%, 45%, 3 #) respectively, and liquidity limit rate (39%) Stroke rate plasticity was (20.6%) The rate coefficient of plasticity total (19.2%)0
objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantatio
Some responses to ancient grammarians
And contemporary researchers
In monograms
The importance of Public Relations activity has increased during the last half of the last century as a specialized and modern administrative function in most institutions. It has, moreover, become an integral part of activities of those institutions of various types, due to its pivotal role in building its reputation and drawing a good mental image among its audiences, as well as its influential and basic role in maintaining communication and the communication between its members at its various levels and their job tasks to ensure the greatest amount of understanding and to enhance trust between them. This is why public relations activity has become indispensable in all institutions, and without it, it is difficult to achieve any coordi
... Show MorePerhaps going to watch movies in cinemas today has become different from what it was before. The cinematic film, the clarity of the image and the luster of its colors pulled the rug out from under the most important change that occurred in the structure of the contemporary cinematography, which is the sound. The surround sound environment that immerses viewers in the realism of sound that reaches them from all directions, and for this the researcher found it necessary to shed light on this topic because of its importance, so the research problem was represented in the following question: (How are modern sound systems used in the structure of contemporary feature films?) The theoretical framework included two topics: the first: the dialec
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MoreThis study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t
Gaucher disease (GD), which is due to a deficiency in the lysosomal enzyme β-glucocerebrosidase, is a rare genetic disorder. It is characterized by a wide variety of clinical manifestations and severity of symptoms, making it difficult to manage. A cross-sectional hospital-based genetic study was undertaken with 32 pediatric patients. We recruited 21 males and 11 females diagnosed with GD, with a male-to-female ratio of 1.91:1. The mean age of the study population was 8.79 ± 4.37 years with an age range from 8 months to 17 years. We included patients on clinical evaluation from 2011 to 2019. An enzyme assay test was used to measure β-glucosidase enzyme activity in leukocytes and the GBA gene s