Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Pectin is available in many plants and in this study, the peels of tomatoes and beet were used to be an economical source of pectin production instead of dumping it with waste or using it as animal feed. The pectin extracted from the peels using different solutions, namely citric acid (2 M), oxalic acid (2%) and hydrochloric acid (0.5 M) the outcome of the extraction methods, 7. 1%, 6% and 11% respectively for tomatoes peels, while the pectin of beet peels were 8%, 6.5%, and 8.3%, and the highest percentage obtained in the manner of hydrochloric acid adopted in the manufacture of yogurt.Yogurt was manufactured with four treatments, in the first treatment standard pectin was added and the second treatment in addition to the pectin extracted
... Show MoreObjective: To evaluate biomarkers of insulin resistance and acute phase reactants in obese, overweight and lean subjects and investigate the associations among those biomarkers. Methodology: This cross sectional study included 158 subjects who were stratified into three groups. Group1 comprised 53 obese patients (BMI≥ 30 kg/m2); group 2 were 54 overweight subjects, and group 3 had 51 healthy lean (BMI
The present study took up the different ways to cultivate the species Epipremnum aureum by two habitat water and soil and comber the anatomical features of the root, stem, and leaf. The results showed amazing significant anatomical features to the ecosystem. The root and stem anatomy showing decrease in all characters that studied but the leaf anatomy showing increase of palisade, spongy tissue thickness, midrib thickness, number of vessels in the xylem also the long and width of stomata of the soilless plants than soil ones. The upper epidermis empty from the stomata for the two treatment and the stoma diffuse in the lower epidermis, the type of it paracytic type. Also the total of flavonoids in the plant that were growth in soil reached 1
... Show MoreThe present study showed that the branchial arch is characterized by the presence of
irregular black line along its length. This line is condensations of melanocytes . The branchial
arch bears two rows of gill rakers at its anterior (internal) side whereas its posterior (external)
side bears two rows of gill filaments. Histologically, the gill arch is composed of hyaline
cartilage surrounded by mixed bone ,which is covered by a mucous membrane. Its epithelium
contains mucous cells and taste buds, whereas its loose connective tissue contains blood
vessels and skeletal muscles. The histological structure of gill raker is similar to that of the
gill arch except the absence of cartilage and muscles .The present st
Colonialism radically transformed the cultures of colonized peoples, often rupturing Indigenous traditions and folklore. Whether creating colonial discourse, promoting orientalist literature, advocating western educational institutions, or through biased media representations, imperial powers systematically oppressed Indigenous and Native peoples. Subjugated communities, however, created, and still form postcolonial discourse from their knowledge systems. This discourse insists on Indigenous and Native culture as central to Indigenous and Native peoples identity. This study examines the postcolonial literature of three groups: Kānaka Maoli, African Americans, and Iraqis. The scope of this dissertation scrutinizes how folklore is employed
... Show MoreThe study aimed to explaining the concepts of water footprint and virtual water and how these two concepts could use to achieve water savings at the local level to meet the water supply deficit in Iraq, which is expected to increase in the coming years and influence of that on food security in Iraq by using these concepts when drawing production, irrigated and import plans in Iraq. The study aimed to studying the water footprint and virtual water and their impact on the foreign trade for wheat and rice crops during the period 2000-2022 and estimating the most important indicators of virtual water and the water footprint of the study crops due to the importance of these criteria in det
Image compression is one of the data compression types applied to digital images in order to reduce their high cost for storage and/or transmission. Image compression algorithms may take the benefit of visual sensitivity and statistical properties of image data to deliver superior results in comparison with generic data compression schemes, which are used for other digital data. In the first approach, the input image is divided into blocks, each of which is 16 x 16, 32 x 32, or 64 x 64 pixels. The blocks are converted first into a string; then, encoded by using a lossless and dictionary-based algorithm known as arithmetic coding. The more occurrence of the pixels values is codded in few bits compare with pixel values of less occurre
... Show More