Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
The research aims to design an electronic program that allows users to assess the possibility of different practices for projects management professional according to the PMBOK methodology)) and using the requirements Data mentioned in the "knowledge and experience in project management Evaluation guide" issued by the professional Institute of project management According to the results of this program will be electronic The possible classification of project management in terms of both (proficiency_ perform tasks) as less than the desired level or within or above average in terms of best practices, and finally a number of recommendations to overcome the possible shortcomings. The most important is the need to enrich the service
... Show MoreThe crude aqueous extract of menthespicata , the objective of this study was to investigate the effects of this extraction , on the histological changes of the ovares and levels of sex hormone , ( FSH , LH , Estradiol ) in albino female mice . the extract was given orally for( 45 ) days . fourty mature female mice were used in this study , the animals divided into four major groups . each group was include ten mice . the first three groups was given different concentration )) (21 , 14 , 7 %) . While the fourth group considered as control group which had been administrated tab water . For ( 45 ) days each group had been killed for hormonal assay in blood
... Show MoreThis work was conducted to study the oxidation of phenol in aqueous solution using copper based catalyst with zinc as promoter and different carrier, i.e. γ-Alumina and silica. These catalysts were prepared by impregnation method.
The effect of catalyst composition, pH (5.6-9), phenol to catalyst concentration ratio (2-0.5), air feed rate (30-50) ml/s, stirring speed (400-800) rpm, and temperature (80-100) °C were examined in order to find the best conditions for phenol conversion.
The best operating conditions which lead to maximum phenol conversion (73.1%) are : 7.5 pH, 4/6 phenol to catalyst concentration, 40 ml/s air feed rate, 600 rpm stirring speed, and 100 °C reaction temperature. The reaction involved an induction period
The present study examines the main points of differences in the subject of greetings between the English language and the Arabic language. From the review of the related literature on greetings in both languages, it is found that Arabic greeting formulas are more elaborate than the English greetings, because of the differences in the social customs and the Arabic traditions and the Arabic culture. It is also found that Arabic greetings carry a religious meaning basing on the Islamic principle of “the same or more so”, which might lead to untranslatable loopholes when rendered in English.
Green synthesis is depending on preparation of nano composited SiO2/V2O5 by using the modified sol-gel method depending on rice husk ash as a source for the extraction of silica gel and the product powder of nano composited SiO2/V2O5 characterization by many techniques such as X-ray diffraction spectroscopy (XRD), field emission scanning electron microscopy (FESEM), and N2 adsorptions/desorption isotherms (BET). This study also includs the biological effectiveness of SiO2/V2O5 and its effect on inhibiting bacterial growth after the prepared nanomaterial was applied to wound dressings, which gave a promising result for its use as
... Show MoreAbstract
The aim of the research is to identify the effect of using the self-questioning strategy on the achievement of fourth-grade students in science and the development of their reflective thinking in physics in the city of Baghdad. The research sample was divided into two groups: an experimental group of (20) students and a control group of (20) students. The researchers developed two tools: a test of (40) multiple-choice questions. The second tool is a test to measure the reflective thinking skills of fourth-grade students. It consists of (25) multiple-choice questions distributed on skills as follow: reflection and observation, detection of inaccuracies, reaching conclusions, giving clear explanations, an
... Show MoreThe research emphasizes importance of preliminary drawings in design of any product. Therefore, using of simulation as tools for visual thinking in developing drawing and design skills. So that practice of drawing by hand, considering shape of ideas in first stage of visualizations, and practice of its techniques and continuous training.
Hence, the research problem arose with the role of simulation method for developing preliminary sketches in the sample of students of the Product Design Department at the College of Design and Art, PNU, as it is important tool for visual thinking that helps the designer in designing and producing innovative artistic works.
Therefore, the research axes, a number of findings and recommendations were
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More