Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malicious attacks as well as in data transmission. The goal of mobile ad hoc security is to safeguard the nodes’ operation and ensure the availability of communication in spite of adversary nodes. The node operations can be divided into two phases. The first phase is to discover the route (s) path. The second phase is to forward the data on the available discovered routes. Both stages need to protect from attacks; so many protocols have been proposed to secure the routing and data forwarding. This is a review study to mobile ad hoc protocols for securing routing as well as protocols for securing packets forwarding. Furthermore, it will present the characteristics and the limitations for each protocol and attributes.
The letters are exposed in some texts of the classical Arabic language (poetry or prose), or in some of the Qur’anic texts, which are the main sources that were adopted on the day when provisions, rules and linguistic controls were established. I say that some of these letters are exposed in some contexts to deletion, mention, or change in the structure and shape of the letter. As for the omission, it is one of the aspects that distinguished Arabic, as well as other languages, for many purposes that differ among their user.
This study aims to investigate the academic leaders’ perceptions towards the degree of availability of the dimensions of organizational immunity systems at the University of Tabuk, as well as to reveal the statistically significant differences between the average responses of the study sample members about the degree of availability of these dimensions at their university due to the variables of (gender, leadership position, and college specialization). To achieve the objectives of the study, a descriptive survey method was used. The study population consisted of (200) male and female leaders who were academic leaders at the University of Tabuk. A questionnaire was used as a tool for collecting data, which its validity and reliability
... Show MoreEscherichia coli (E. coli) is a frequent gram-negative bacterium that causes nosocomial infections, affecting more than 100 million patients annually worldwide. Bacterial lipopolysaccharide (LPS) from E. coli binds to toll-like receptor 4 (TLR4) and its co-receptor’s cluster of differentiation protein 14 (CD14) and myeloid differentiation factor 2 (MD2), collectively known as the LPS receptor complex. LPCAT2 participates in lipid-raft assembly by phospholipid remodelling. Previous research has proven that LPCAT2 co-localises in lipid rafts with TLR4 and regulates macrophage inflammatory response. However, no published evidence exists of the influence of LPCAT2 on the gene expression of the LPS receptor complex induced by smooth or rough b
... Show MoreBackground: Ultrasonography has been used to examine the thickness of the lower uterine segment in women with previous cesarean sections in an attempt to predict the risk of scar dehiscence during subsequent pregnancy. The predictive value of such measurement has not been adequately assessed. Objectives: To correlate lower uterine segment thickness measured by trans abdominal ultrasound in pregnant women with previous cesarean section with that measured during cesarean section by caliper and to find out minimum lower uterine segment thickness indicative of integrity of the scar.Methods: A prospective observational study at Elwyia Maternity Teaching Hospital, from January 2011 to January 2012. A total of 143 women were enrolled in the stu
... Show MoreThe accession of countries to the World Trade Agreement and the openness of markets to each other without restrictions led to the emergence of the philosophy of "a world without borders and business units without countries", which required adapting the modern business environment to that philosophy, which is considered as objectives for the activities of the units that must be implemented in order to achieve competition. The objective of the units has changed from making profit to meeting the desires of customers, which is what imposed a new role for management accounting as a field of knowledge renewed in it visions of competitiveness between units. Because of the increasing needs for information in light of environmental change
... Show MoreBackground: This study was performed to determine the effect of aging of different types of composite material restorations on: Shear bond strength (SBS) to light cure and no mix chemical cure orthodontic adhesives with sapphire bracket and the debonding failure sites. Materials and methods: One hundred forty four composite disks were made from three different composite resin materials which are: 3M Filtek Z250, 3M filtek Z350 and 3M Valux plus, each group with (48) disks each, then according to the duration of storage each group was subdivided into two equal groups one of them stored for one day and the other was stored for one month, then each group was further subdivided into two equal subgroups with (12) disks each one bonded with ligh
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show MoreA poetic vision appeared in the poem of Al-Abbas bin Mardas Al-Sulami. He lived in the eras of pre-Islamic times and the emergence of Islam. The focus of this research: is the study of poetic text in the pre-Islamic era and the era of early Islam. The research followed a method in treating poetic texts, as it is based on presenting poetic texts from the collection of Al-Abbas bin Mardas, explaining the features of his poetic vision, and examining all the external factors that surrounded the poet and influenced his vision and all his thoughts. The results of this research was that Al-Abbas Ibn Mardas revealed some of the positions that he found contradicted the authentic Arab value before the advent of Islam, and the poet Abbas bin Mardas tr
... Show MoreLand Transport regards a main element in the In Fra – structure of the national economy where distance and time shortness, open new opportunities of work, develop the different regions and rise the standard of living….
It is necessary to emphasize that the circumastances surrounding Iraq such as wars, economic sanctions, blockade occupation effected negatively upon economic Indicators of land Transportion including Value of output Value added contraction of Investment allocation and Investment expend tuer and the period of implementation and fulfillment of the projects of Land Transport to be ready to offer their service in underdeveloped country Like Iraq aiming to satisfy Fast and acomprehensi
... Show More