In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show MoreHighway network could be considered as a function of the developmental level of the region, that it is representing the sensitive nerve of the economic activity and the corner stone for the implementation of development plans and developing the spatial structure. The main theme of this thesis is to show the characteristics of the regional highway network of Anbar and to determine the most important effective spatial characteristics and the dimension of that effect negatively or positively. Further this thesis tries to draw an imagination for the connection between highway network as a spatial phenomenon and the surrounded natural and human variables within the spatial structure of the region. This thesis aiming also to determine the natu
... Show MoreA batch and flow injection (FI) spectrophotometric methods are described for the determination of barbituric acid in aqueous and urine samples. The method is based on the oxidative coupling reaction of barbituric acid with 4-aminoantipyrine and potassium iodate to form purple water soluble stable product at λ 510 nm. Good linearity for both methods was obtained ranging from 2 to 60 μg mL−1, 5–100 μg mL−1 for batch and FI techniques, respectively. The limit of detection (signal/noise = 3) of 0.45 μg mL−1 for batch method and 0.48 μg mL−1 for FI analysis was obtained. The proposed methods were applied successfully for the determination of barbituric acid in tap water, river water, and urine samples with good recoveries of 99.92
... Show MoreBackground: Bone augmentation techniques are commonly employed in medical fields. This biomaterial system must be readily available, easily applicable by minimally-invasive technique and able to release an osteoinductive growth factor. Such a system will be able to engineer new bone formation locally at the site of injection. Hyaluronic acid has osteogenic potential that can be exploited not only for repairing bone defects but also for providing transplantable bone for the reconstruction of a variety of bone defects. The aims of this study were to evaluate the effects of Hyaluronic acid gel on bone healing by immunohistochemical estimation of transforming growth factor -beta 3 in experimental and control groups. Materials and methods: Thirt
... Show MoreThis work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The
... Show More
