Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without
... Show MoreThe study was reflection of the impact of the widespread use of polymer Novolak composite reinforced Glass fiber and Asbestos fiber once again with weight fraction 60% on the physical properties, which included (Hardness, Compressive deformation, compressive modulus of elasticity, Flexural modulus of elasticity, Resilience modulus, the maximum of Flexural strength, Flexural strain energy and Shear strength inner layers); it is known how much important the media as a source of bacterial contamination, which contributes directly or indirectly in the process of aging of these materials. These Novolak composite reinforced, prepared by weight fraction of (10%) and (14%) of the Hexamethylene-tetraamine (HMTA) hardener material. It
... Show MoreThe aim of present study is to determine the optimum parameters of friction stir welding process and known the most important parameter along with percentage contribution of each parameter which effect on tensile strength and joint efficiency of FS welded joint of dissimilar aluminum alloys AA2024-T3 and AA7075-T73 of 3 mm thick plates by applied specific number of experiments using Taguchi method .AA2024 was placed on the advancing side and AA7075 on the retreating side. FSW was achieved under three different rotation speeds (898, 1200 and 1710) rpm, three different welding speeds (20, 45 and 69) mm\min , three different pin profiles (cylindrical, threaded cylindrical and cone) and tool tilt angle 2◦. Taguchi method w
... Show MoreThe two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show MoreSpecimens of the sesarmid crab Nanonsesarma sarii (Naderloo and Türkay 2009) were collected from the intertidal zone of Khor Al-Zubair, Basrah, Iraq 2012 far from the Arabian Gulf coasts. Morphological features of this species are highlighted and a figure is provided.
Soaking dentures with disinfection solutions is an effective way of keeping dentures in a healthy status; however, immersions in these solutions have a negative effect on the bond strength of denture base and denture teeth. The aim of this study was to evaluate the bond strength between denture acrylic teeth and heat-cured Poly (methyl methacrylate) denture base material (with and without nano silica) after disinfection with different chemical disinfectants for a simulated period of six months. One hundred specimens of maxillary central incisors attached to PMMA were divided into two groups; 50 specimens of PMMA without nano silica and 50 specimens of PMMA reinforced with 5 wt% of nano silica. Specimens of each group were immersed in five i
... Show Moreالمقدمة
تتعامل الجهات الضريبية في مختلف دول العالم بأساليب عديدة لجباية الضرائب من المكلفين بغض النظر عن فئات وأصناف هؤلاء المكلفين،وفي العراق تم اعتماد العديد من الأساليب لجباية الضرائب على امتداد المدد الزمنية المتعاقبة،وكان لأسلوب التقدير الذاتي وهو أحد تلك الأساليب مجالاً للتطبيق خلال مدة زمنية معينة،حيث جرى تطبيق هذا الأسلوب على وحدات اقتصادية معينة، وبالرغم من المساوئ التي قد ترافق تطبيق
... Show MoreГоды, принадлежащие концу XIX – началу XX столетия, вошли в русскую литературу под красивым названием Серебряный век. В это время в стране появился целый ряд выдающихся поэтов, имена которых навсегда останутся в русской и мировой литературе. Это Ахматова, Гумилев, Блок, Маяковский и многие другие. Все эти люди творили в нелегкое для России время. Началом Серебряного века условно считают 189
... Show MoreUrinary tract infections (UTIs) mean microbial pathogens in the urethra or bladder (lower urinary tract). Important risk factors for recurrent UTI include obstruction of the urinary tract, use of a bladder catheter or a suppressed immune system. This study aims to isolate and identify bacteria from patients with TCC-bladder cancer or patients with a negative cystoscope and estimate antibiotic susceptibility patterns and evaluate some of the virulence factors. From a total of 62 patients with TCC-BC or negative cystoscope, only 35 favorable bacterial growths were obtained, including Escherichia coli (UPEC), a significant bacterial isolate, and Stenotrophomonas maltophilia. The percentage of multi drug-resistance bacteria
... Show More