Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The aim of the research is to identify the problems of teaching computer material concerning fourth grade students’ point of view in the computer department in the College of Education for Women by identifying the statistically significant differences between the answers of female students to problems in the field of school administration and in the field of teaching computer subject included the sample of research On (39) of (50) students and (78%) From the fourth grade students in the department of computer who had achieved the theoretical part in the first semester and the assembly application in the second semester in the schools of Baghdad city for the aca
... Show MoreThis research sheds light on the development that has occurred on the use of press pictures in the Iraqi press by analyzing the form and content of the images used in (Al-Sabaah) newspaper for the 2012 model. The researcher's interest in this topic for what represented by the press picture of a way to highlight and attract the reader's attention to the substance journalist who represents the goals behind the newspaper publishing.
This research is divided into three sections. The first one dealt with the methodological framework of the research, and the second part addressed the aspect of press pictures and its history and technological development, while the third section devoted to the study of the development of the form and co
... Show MoreThe study aims to examine the classroom activities of the developed English course (Flying High) for the high school first-grade students, identify creative thinking skills appropriate for this grade, and show the extent the classroom activities involve these skills from the female- teachers ‘point of view. The study adopted the descriptive survey method. The study community consists of all (50) English female-teachers who teach high school first grade in Arar city during the academic year (1440 -1441 A.H, the first semester). The study was applied to all respondents. The researcher used a questionnaire as a study tool. The study revealed that the female-teachers reported their disagreement and refusal of the classroom activities in th
... Show MoreThe present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreAbstract
The open budget means everyone in the society can get information about the government budget in order to watch the governmental works. The aim of the research is to study the concepts of open budget, its advantage, limitations, role of supporting the transparency and questioning the administrative and financial corruption. Thus reflects positively on the national economy by providing governmental information to all users whether they are individuals or belong to the political class, or any other governmental or nongovernmental organizations which are interested in these information.
In order to achieve the objectives of the research aims, we make questionnaire to see aca
... Show MoreBackground: Nasal obstruction is common in otorhinolaryngology outpatient visitors. The diagnosis of such compliant is by history, clinical examination and diagnostic procedures. Nasal endoscopy and computerized tomography scan are common diagnostic investigations. Nasal obstruction is either anterior or posterior (nasal septal deviations, hypertrophied turbinate pathological cyst, polyps, mass etc), or postnasal obstruction (hypertrophied turbinate, adenoid hypertrophy, nasopharyngeal cyst or nasopharyngeal tumors).
Aim of study: Prospective study to compare endoscopic finding and computerized tomography of nose, paranasal sinuses and postnasal space as diagnostic methods for nasal obstruction and other nose, p
... Show MoreObesity is a risk factor associated with age-related disorders that accelerate aging, and it increases the risk of metabolic diseases. Therefore, this study was conducted to investigate the association of leukocyte telomere length (LTL) with the presence of higher body weight in middle-aged females and males. The study subjects comprised 160 (80 control and 80 higher body mass index BMI groups) with ranging ages of 30-50 years included and stratified for BMI. The physio-biochemical analysis was measured using enzymatic determination. Mean telomere length was determined by using the southern blotting technique. The association analysis revealed a significant variance (P < 0.01) in biochemical parameters between higher BMI grou
... Show MoreBackground: Pemphigus vulgaris (PV) is an autoimmune vesiculobullous mucocutaneous disease with life-threatening consequences. Rituximab (RTX) has recently emerged as an effective treatment for PV. Objectives: This study aims to determine changes in neutrophil and platelet counts for PV patients treated with RTX or corticosteroids combined with Imuran (azathioprine). Materials and Methods: The present cross-sectional study was conducted in the Department of Dermatology at Baghdad Teaching Hospital, Baghdad, Iraq. Thirty PV patients received two types of treatment: 15 patients were administered RTX and 15 patients took corticosteroids with Imuran (azathioprine). Neutrophil and platelet counts were detected at the hospital laboratory. Results
... Show MoreThe reaction paths of the C-C and C-H bond cleavage in the anthracene and phenanthrene aromatic molecules are studied by applying the ab-initio DFT method. It is found that the C-C bond cleavage proceeds via a singlet aromatic transition state, compelled through a disrotatoric ring opening reaction. A suprafacial H atom shift follows the transition state, leading to the formation of a methylene -CH2 and an acetylenic or allenic moiety. The calculated activation energies for anthracene range from 158.81-208.90 kcal/mol and the reaction energies from 96.106-156.976 kcal/mol. For phenanthrene, the energy values are 157.39-202.34 kcal/mol and 62.639-182.423 kcal/mol, respectively. For the C-H cleavage reactions, the calculated reaction energies
... Show More