Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
Al-Huweizah Marsh is considered as the largest in Iraq. This research aims to maintain thesustainability of Al-Huweizah Marsh under all circumstances and within the limits of the
available natural resources from the Iraqi side and the absence of feeding from the Iranian sidedue to the recent Iranian separation dike along the international boundaries within the marsh.
Twelve scenarios have been suggested as a first step to restore the whole marsh. But the
uncontrolled Iranian feeders and exiguity of their discharges recently, it was necessary to studyonly the northern part of the marsh as an alternative case to ensure reasonable amounts of waterfor the purpose of maintaining and restore the marsh. Hydrological routing model was
The main aim of the research is to identify the impact of the application of IFRS for SMEs on optimizing the utility of information for financial reports. To answer the questions and test the hypotheses of the research, researchers relied on the descriptive analytical approach. First, the researchers clarified the theoretical aspect through previous studies, and then they analyses d the results of the applied study by testing the hypothesis using the SPSS.
A questionnaire was distributed after evaluation and arbitration by a number of specialists on selected sample. The sample of 120 respondents consists of general managers, department directors, head of departments, accountants, auditors and financial controllers working in the
... Show MoreEducation by lectures has been standard for 100 years or more. Given the 21st century technology, people can connect with others around the world instantly, electronically. With the pandemic, teaching changed to one-way information transfer with the loss of interpersonal learning experience. SNI® and now SNI Digital™ have been experimenting with different forms of communication to transfer information.
Using an interactive education model, a meeting for neurosurgeons in Baghdad was held for students, residents, and neurosurgeons
In this research, the size strain plot method was used to estimate the particle size and lattice strain of CaTiO3 nanoparticles. The SSP method was developed to calculate new variables, namely stress, and strain energy, and the results were crystallite size (44.7181794 nm) lattice strain (0.001211), This method has been modified to calculate new variables such as stress and its value (184.3046308X10-3Mpa) and strain energy and its value (1.115833287X10-6 KJm-3).
In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.
A new series of Fe (III) , Co (II) , Ni (II) and Cu (II) complexes of the Schiff base, 5 (2-hydroxy benzylidine) -2-thio ether -1, 3, 4-thiadiazole were prepared and characterized .The imine behaves as a bidentate. The nature of bonding and the stereochemistry of the complexes were deduced from metal analyses, infrared, electronic spectra,magnetic susceptibility and conductivity measurements, an octahedral geometry was suggested for all complexes except the copper complex has a square planar geometry .preliminary in vitro tests for antimicrobial activity show that all the prepared compounds except iron complex display good activity to gram positive Staphelococcus aures and gram negative Escherchia coli.
Background: There is a strong desire of adolescent to have a peer group and to be appreciated and also to become a member of this group which can affect one each other. There for; encourage, adapting,and imitating of friends and group consider as the main reasons behind starting of smoking among youngsters. Smoking habits in the family were found tobe acause of smoking pressure among adolescentas peer pressure. Smoking habit may be started before 18 years of age in most adult smokers.
Objectives: To study the effect of peer pressure and family smoking habiton the prevalence of smoking among secondary school students.
Type of the study: A cross
... Show MoreThe developments and transformations taking place in the era and the growth of knowledge economies and communication technology led this development to compel higher education institutions in Iraq to reconsider their objectives to keep pace with development. And one of the most important tools of development was the application of e-learning standards and its long-term impact on the performance of the educational institution. Performance auditing plays an important role in verifying the extent to which these institutions have implemented their activities and programs that auditing performance by adopting e-learning standards helps the institutions’ management by providing appropriate information on the extent to which they achieve thei
... Show MorePure cadmium oxide films (CdO) and doped with zinc were prepared at different atomic ratios using a pulsed laser deposition technique using an ND-YAG laser from the targets of the pressed powder capsules. X-ray diffraction measurements showed a cubic-shaped of CdO structure. Another phase appeared, especially in high percentages of zinc, corresponding to the hexagonal structure of zinc. The degree of crystallinity, as well as the crystal size, increased with the increase of the zinc ratio for the used targets. The atomic force microscopy measurements showed that increasing the dopant percentage leads to an increase in the size of the nanoparticles, the particle size distribution was irregular and wide, in addition, to increase the surfac
... Show More