Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreBackgr ound: The transfer of the tibialis posterior tendon to the anterior aspect of the ankle not only replaces the function of the paralyzed muscles, but also removes the deforming force on the medial aspect of the foot. Objecti ves: In this study, we evaluated patients who underwent tibialis posterior tendon transfer for the treatment of foot drop, and comparison through interosseous membrane route versus anterior to lower tibia route of tibialis posterior tendon transfer, with evaluation of the results according to carayon criteria Methods: Nine patients with foot drop secondary to different causes treated with tibialis posterior tendon transfer from January 2011 to January 2012 were followed up for a mean of 12 months in Al Kindy Teach
... Show MoreBac kground: The transfer of the tibialis posterior tendon to the anterior aspect
of the ankle not only replaces the function of the paralyzed muscles, but also
removes the deforming force on the medial aspect of the foot.
Objec t i ves : In this study, we evaluated patients who underwent tibialis
posterior tendon transfer for the treatment of foot drop, and comparison through
interosseous membrane route versus anterior to lower tibia route of tibialis
posterior tendon transfer, with evaluation of the results according to carayon
criteria
Methods: Nine patients with foot drop secondary to different causes treated with
tibialis posterior tendon transfer from January 2011 to January 2012 were
followed up for a
The article approaches the characteristics of Russian literature in the time of Khrushchev or the "thaw" period a very short period of Soviet history, characterized by the easing of the dictatorship of power and relaxation in various areas of people's lives. The interest in the research is focused on the importance of interpreting the family portrait in a short but distinct period in the development of Russian/Soviet literature. The research material is the story of Sholokhov's “The Fate of Man” 1956, the story of Panova “Serioga” 1955, and Abramov’s story “Fatherless” 1961. В статье рассматриваются особенности художественной литературы периода хруще
... Show MoreOver the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show MoreSubcutaneous vascularization has become a new solution for identification management over the past few years. Systems based on dorsal hand veins are particularly promising for high-security settings. The dorsal hand vein recognition system comprises the following steps: acquiring images from the database and preprocessing them, locating the region of interest, and extracting and recognizing information from the dorsal hand vein pattern. This paper reviewed several techniques for obtaining the dorsal hand vein area and identifying a person. Therefore, this study just provides a comprehensive review of existing previous theories. This model aims to offer the improvement in the accuracy rate of the system that was shown in previous studies and
... Show More