Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
This current research aims to reveal the difference between the levels of teaching expertise of physics teachers according to the years of service by answering the following question: does the educational skill level of physics teachers work according to the service? The sample of the study consisted of (225) physics teachers by (125) females (56%), and (100) males (44%), distributed on (4) education directorates in Baghdad governorate on both sides of al-Karkh and al-Rusafa. In order to achieve the aim of the study, the researcher prepared a note card for expertise teaching, consisting of (39) paragraphs distributed into (5) fields. The apparent validity and reliability of the card were verified through an agreement (the researcher hers
... Show MoreAbstract
Through social service tasks for the elderly, it natural for elder people to have some attitudes about the quality and nature of provided services, whether negative or positive. Accordingly, the current research is an attempt to investigate the attitudes of the elderly toward the social service provided to them in the nursery homes. The research sample included 60 elderly people chosen from the nursey home at Al-Karrada district and then a scale of attitudes was administered to them that had proved its reliability and validity. The study concluded with a set of recommendations and suggestions were.
The research represents a contribution to the re-engineering of the conditions of the assignment of the public service and isolation of them due to illness, especially the disease, which was not treated by the law of AIDS to ensure the transfer of the person who enjoys the best physical and psychological health.
Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm
... Show MoreAn efficient networks’ energy consumption and Quality of Services (QoS) are considered the most important issues, to evaluate the route quality of the designed routing protocol in Wireless Sensor Networks (WSNs). This study is presented an evaluation performance technique to evaluate two routing protocols: Secure for Mobile Sink Node location using Dynamic Routing Protocol (SMSNDRP) and routing protocol that used K-means algorithm to form Data Gathered Path (KM-DGP), on small and large network with Group of Mobile Sinks (GMSs). The propose technique is based on QoS and sensor nodes’ energy consumption parameters to assess route quality and networks’ energy usage. The evaluation technique is conducted on two routing protocols i
... Show MoreThis study research to Showing The impact of the integration process on the quality of Insurance service and analyze the impact financially to determine whether there is any impact on the quality of the insurance service, in addition to identifying the obstacles that impede the merger between the insurance companies, insurance and the appropriate proposals for its' application and benefit from the benefits achieved.
The importance of The study lies in the fact that it is an important and vital spotlight that is becoming increasingly important in the world to confront the various difficulties and crises that have occurred recently in light of the liberalization of international trade, globalization a
... Show MoreThis paper presents a minimum delay congestion control in differentiated Service communication networks. The premium and ordinary passage services based fluid flow theory is used to build the suggested structure in high efficient manage. The established system is capable to adeptly manage both the physical network resource limitations and indefinite time delay related to networking system structure.
Adolescence important and sensitive stage in social terms, being a stage where learns teenager bear social responsibilities and composition of their ideas about family life, as well as it is the stage where the teenager looking to himself for an important place in the community to become independent socially people, so it highlights the role of Social Work to do better effort and I believe him in order to prepare for the adolescent stage of adolescence and help him overcome the problems so that makes it adapts to the society in which he lives
Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I
... Show More