Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
Objective: The study aims to determine the effectiveness of the continuing nursing education
program on nursing staffs knowledge in kidney transplantation unit and to find out the relationship
between nursing staffs knowledge and demographic characteristics (age, gender, education level, and
years of experiences in kidney transplantation unit).
Methodology: A quasiexperemental design (One-group Pretest - Posttest design) was carried out in
kidney transplantation units at Baghdad Teaching Hospitals, from December 2011 to July 2012. A nonprobability
(purposive sample) of (16) nurses were selected from kidney transplant units at Baghdad
teaching hospitals, the choice was based on the study criteria. The data were collec
Objective: The study aims to determine the effect of Toxoplasma gondii infection on the
genetic sequence of breast cancer patients in the Medical City Hospital – Tumor Unit /
Iraq-Baghdad.
Methodology: A study was carried out in the City of Medicine / Oncology Unit / Baghdad,
during the period 1st June 2016 to 15
th March 2017. Forty samples of tissue and serum
were collected from patients who complaining from Breast cancer and infected with
Toxoplasmosis. Forty sera samples were taken from patients complaining from parasitic
infection only; without breast cancer as control group. Data is analyzed by using of
descriptive and inferential data analysis methods.
Results: The results show that there is an effe
There are many animal models for polycystic ovary (PCO); using exogenous testosterone enanthate is one of the methods of induction of these models. However, induction of insulin resistance should also be studied in the modeling technics. Therefore, the present study aims to investigate the expression of insulin receptor substrate (Irs)-2 mRNA in the liver tissue of rat PCO model. Nineteen Wistar rats were divided into three groups; (1) PCO modeling group (N =7) received daily 1.0 mg/100g testosterone enanthate solved in olive oil along with free access dextrose water 5%, (2) vehicle group (N =6), which handled like the PCO group, but did not receive testosterone enanthate, (3) control group (N =6) with standard care. Al
... Show MoreThis research involves study effect of chloride ions in concentration range (0.01 – 0.50 mol.dm-3) on the corrosion behavior of Al-Zn alloy in basic media of 1x10-3 mol.dm-3 NaOH at pH=11 and four different temperatures in the range (298-313 K). Cathodic and anodic Tafel slopes (bc &ba) and transfer coefficients (αc & αa) were calculated and the results interprets according to the variation of the rate – determining steps. The results also indicate that the chloride ions are bonded chemically in the interface as an initial step of formation of different mixed oxohydroxy – and chloro complexes. Polarization resistance (Rp) is calculates
... Show MoreThe child spends several hours watching animated films, which affect their behavior negatively and positively. This calls parents to monitor what their children are watching, to show them the serious risks of some violent films, and to direct them toward choosing both positive and educational programs that develop their positive behavior. This study aimed to explore the positive and negative effects of watching animation films as well as to identify the role animation films in increasing the cognitive knowledge of kindergarteners. To do this, the descriptive and analytical methods were used. A questionnaire was adopted as a tool for data collection. A scale of (45) items classified into three categories was applied on the r
... Show MoreCO2 laser (10.6 μm) is the most often used laser in the oral surgery due to its high absorption by water of the oral tissues. Several benefits of the use of CO2 laser have been reported for oral surgical procedures. This study aims to evaluate the effect of CO2 laser on soft and hard oral tissues (in vitro study). This study was done on fresh tissues from sheep’s head. CO2Surgical Laser with different operation modes was used; 0.2 mm spot size using different laser parameters on the tongue, and bone making holes, incisions and cutting. The depths and widths of holes and incisions were measured using endodontic file under magnification. The speed of incisions was calculated and the required time for cutting was measured using sport clo
... Show MoreThe attention of civil society organizations, governments and international non-governmental organizations in recent years has focused on the acute practices adopted by companies with the aim of reducing the tax burden, and the results of these practices have a negative impact on the tax revenues that the state uses to finance public needsThe aim of the research is to measure the impact of the voluntary disclosure of companies on tax planning for the period from 2011 to 2015 and the research community is in the General Tax Authority. The research sample is 6 companies within the private sector in the financial, banking, insurance and industrial fields. The research was based on a special model to measure the optional disclosure,
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreIn this article, a short review on the feature of reality and locality in quantum optics is given.
The Bell inequality and the Bell states are introduced to show their direct use in quantum computer and
quantum teleportation. Moreover, quantum cryptography is discussed in some details regarding basic
ideas and practical considerations. In addition, a case study involving distillation of a quantum key based
on the given fundamentals is presented and discussed.