Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreThe marshes are one of the important environmental features affecting human and animal systems, so the studying of changes they undergo is one of the important topics. This study is concerned with the changes occurring in the Al Saadya marsh for the period from 1987 to 2017 exclusively in the winter season (the marshes’ revival season in Iraq revive). In order to inspect the changes in this marsh, we choose 7 years to cover the study period as a criterion years, namely 1987, 1990, 1995, 2000, 2007, 2014 and 2017. The “Maximum Likelihood” classifier was used to separate the stacked land cover features, where the minimum overall accuracy ratio that recorded for all years of study was 96%. The results revealed that Al-Saadya marsh went t
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAbstract: The aim of the current research is to find out the extent to which systems thinking skills are included in the mathematics textbook scheduled for the third intermediate grade for the academic year (2020-2021) by answering the main research question: What are the systems thinking skills included in the mathematics textbook for middle third grade? The analytical descriptive approach was used, and to achieve the goal of the research, a list of the main systemic thinking skills and sub-skills was prepared, and after analyzing the content of the mathematics textbook, the reliability of the analysis was verified through the analysis over time and through others, and it obtained a reliability rate of 98% us
... Show MoreThe research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater
... Show MoreStrong and ∆-convergence for a two-step iteration process utilizing asymptotically nonexpansive and total asymptotically nonexpansive noneslf mappings in the CAT(0) spaces have been studied. As well, several strong convergence theorems under semi-compact and condition (M) have been proved. Our results improve and extend numerous familiar results from the existing literature.
In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me
Integrated project delivery is collaboratively applying the skills and knowledge of all participants to optimize the project's results, increase owner value, decrease waste, and maximize efficiency during the design, fabrication, and construction processes. This study aims to determine IPD criteria positively impacting value engineering. To do this, the study has considered 9 main criteria according to PMP classification that already covers all project phases and 183 sub-criteria obtained from theoretical study and expert interviews (fieldwork). In this study, the SPSS (V26) program was used to analyze the main criteria and sub-criteria priorities from top to bottom according to their values of the Relative Importance In
... Show More