Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.
شهد العصر الذهبي للإسلام تحول أساسي في مجال الزراعة عرف باسم "الثورة الزراعية الإسلامية" أو" الثورة الخضراء" أو "الثورة الزراعية العربية" ، وقد أتاح الوضع الاقتصادي العالمي الذي أسسه التجار المسلمون في جميع أنحاء العالم القديم ، نشر العديد من النباتات والتقنيات الزراعية بين أجزاء مختلفة من العالم ا
... Show MoreThe goal of current researcher to know the impact of strategic Jigsaw in the collection of hypertext and geographic operations of science students at the preparatory stage And that by checking the following 1.There is no difference statistically significant at the significance level 0.05 between the experimental group students who were studying strategy Jigsaw and between the control group students who studied in the usual way traditional degrees in the average achievement in the subject of geographical 2.There is no difference statistically significant at the significance level 0.05 between the experimental group students who were studying strategy Jigsaw and between the control group students who studied in the usual way traditional av
... Show MoreThe issue of the survival of the Ottoman Empire during the nineteenth century, a controversial topic in European diplomacy, was what was called the "Eastern Question" containing the fate of this country and its regions sprawling one of the hottest topics in the diplomatic major European powers of that century
أرمينيا أكبر وأعلى إقليم جبلي في آسيا الغربية ، تقع عند الحدود الفاصلة بين آسيا وأوربا ، انعمت عليها الطبيعية بتضاريس كانت تارة خيراً وبركة على الأرمن وتارة اخرى شراً ووبالاً عليهم ، والى جانب كونها منطقة عبور هامة بين الشرق والغرب فان الارباح الطائلة التي جنتها من نشاطها الاقتصادي دفع الدول الكبرى آنذاك إلى السيطرة عليها وسلبها حريتها . وتتابع على ضمها الى نفوذه منذ ظهورها في القرن السابع قبل الميلاد كل من ا
... Show MoreNovel bidentate Schiff bases having nitrogen-sulphur donor sequence was synthesized from condensation of racemate camphor, (R)-camphor and (S)-camphor with Methyl hydrazinecarbodithioate (SMDTC). Its metal complexes were also prepared through the reaction of these ligands with silver and bismuth salts. All complexes were characterized by elemental analyses and various physico-chemical techniques. These Schiff bases behaved as uninegatively charged bidentate ligands and coordinated to the metal ions via ?-nitrogen and thiolate sulphur atoms. The NS Schiff bases formed complexes of general formula, [M(NS)2] or [M(NS)2.H2O] where M is BiIII or AgI, the expected geometry is octahedral for Bi(III) complexes while Ag(I) is expected to oxidized t
... Show MoreThe syntheses, characterizations and structures of three novel dichloro(bis{2-[1-(4-methoxyphenyl)-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II), [M(L)2Cl2], complexes (metal = Mn, Co and Ni) are presented. In the solid state the molecules are arranged in infinite hydrogen-bonded 3D supramolecular structures, further stabilized by weak intermolecular π…π interactions. The DFT results for all the different spin states and isomers of dichloro(bis{2-[1-phenyl-1H-1,2,3-triazol-4-yl-κN3]pyridine-κN})metal(II) complexes, [M(L1)2Cl2], support experimental measurements, namely that (i) d5 [Mn(L1)2Cl2] is high spin with S = 5/2; (ii) d7 [Co(L1)2Cl2] has a spin state of S = 3/2, (iii) d8 [Ni(L1)2Cl2] has a spin state of S =
... Show Morenew six mixed ligand complexes of some transition metal ions Manganese (II), Cobalt(II), Iron (II), Nickel (II) , and non transition metal ion zinc (II) And Cadmium(II) with L-valine (Val H ) as a primary ligand and Saccharin (HSac) as a secondary ligands have been prepared. All the prepared complexes have been characterized by molar conductance, magnetic susceptibility infrared, electronic spectral, Elemental microanalysis (C.H.N) and AA . The complexes with the formulas [M(Val)2(HSac)2] M= Mn (II) , Fe (II) , Co(II) ,Ni(II), Cu (II),Zn(II) and Cd(II) L- Val H= (C5H11NO2) , C7H5NO3S The study shows that these complexes have octahedral geometry; The metal complexes have been screened for their in microbiological activities against bacteria.
... Show MoreThe reaction of 1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one with one equivalent of 4-chlorophenol by coupling reaction afforded (E)-4-((5-chloro-2- hydroxyphenyl)diazenyl)-1,5-dimethyl-2-phenyl-1H-pyrazol-3(2H)-one. Then azo ligand was characterize using spectroscopic studies ( FTIR,UV-Vis, 1H and 13CNMR, Mass) also micro-elemental analysiz (C.H.N.O). Transition metal chelation with Co(II), Ni(II), Cu(II), and Zn(II) was investigated, revealing 1:2 metal-to-ligand stoichiometry with octahedral geometry. The biological, and industrial application for the azo ligand and it is complexes were evaluated, demonstrating antimicrobial activity against bacterial and fungal strains, with the Zn(II) complex exhibiting superior inhibition. Additionally,
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show More