Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
This study came to show the importance of long hope and its extent on human life, and I found that through the research, the majority of the scholars did not address this topic separately, and did not explain the travails of this situation and the worldly problems it causes to its owner, and the consequences that fall upon it in the hereafter. Most of the studies inside of the books consisted of a simple presentation of this problem and an explanation of the remedies that came to us from the Qur'an and the hadiths and the Sunnah, and on the sayings of the imams of guidance (may the best prayers and peace be upon them), and on the chosen companions and followers, may God be pleased with them, but the length of hope does not stop At a certain
... Show MorePrison and imprisonment
And their impact on the strengthening of power
In the Qur'anic perspective
Purification of fifteen NaCl samples from natural and different area in the middle and south of Iraq are prepared and studied the structural characteristics of samples by powder X-ray diffraction analysis at ð›Œ=1.542Ã…. The present work considered the specific activities of naturally occurring radioactive materials in salt samples, which are measured and analyzed using high resolution HPGe system. Also, the radiological parameters have been considered in this work. The average specific concentration (in Bq.kg-1) of the salt samples is found 16.864.92 for 226Ra, 5.972.05 for 232Th and 9.852.8 for 40K, respectively, which are below the national levels, 40Bq.kg-1, 30Bq.k
... Show MoreThe experiment was conducted to evaluate and performance comparison for moldboard and disk plows in central of Iraq in 2011. Three factor were used in this study included Two types of plows included moldboard and disk plows which represented main plot , three forward speeds of the tillage was second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and three levels of soil moisture was third factor included 21 , 18 and 14 % to determined data actual plow depth , Practical productivity, Volume of disturbed soil, Field efficiency , Slippage percentage in silt clay loam soil with depth 22 cm were studied in the experiment Split – split plot design under randomized complete block design with three replications using
... Show MoreQuadrupole transition rates and effective charges are calculated for even-even Si,
S and Ar isotopes based on sd and sdpf -shell model spaces. Shell model
calculations are performed with sd shell-model space for neutron number (N) ≤ 20
and sdpf shell-model space for N > 20. Excitation out of major shell space are taken
into account through a microscopic theory which allows particle-hole excitation
from the core and model space orbits to all higher orbits with 2 excitation.
Effective charges are obtained for each isotope. The results show a systematic
increase in the B(E2) values for N 20. Shell model calculation predicts the erosion
of the N=28 magicity in the neutron rich 42Si. No clear indications abo
The topic of the research tagged (narrative structure and its impact on building open and closed endings in the fictional film) is summarized by studying the mechanism of employing closed and open endings in the fictional film. novelist, then the need for it, as well as the objectives of the research and clarifying its limits as well as its importance. Then moving to the theoretical framework, which included three topics, where the first topic was entitled (the cinematic construction of the film narrative), either the second topic (the structure of complexity and narrative solutions), or the third topic dealt with the subject (the structure of the end and its relationship to the construction of the narrative). After completing the theore
... Show MoreSoil acts as a last sink for elements that people release into the environment through a range of activities due to its physiochemical characteristics. These substances, whether are organic or mineral pollutants, accumulate in the soil and constitute a significant risk to the ecosystem in general because they mess with the chemical and physical equilibrium of the soil, get into the food chain, and eventually get to people. When pollutant concentrations during the bioaccumulated process exceed the global standards for what is regarded as a contaminant in water, air, and soil. Nine soil samples were collected from different sites and two samples from each site at two depths (0-20 and 20-40 cm) to determine if there were any
... Show More