Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Background: The study was designed to evaluate the effect of local application of exogenous VEGF/collagen I separately and as a combination in socket healing. Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1st molar of both sides (right side was considered as experimental site, while left be the control one, treated with 1µL of normal saline). The rats were scarified at 3, 7, 14, 28 days post extraction. Socket healing was histologically examined with immunohistochemistochemical localization of ALP&FGF2. Materials and Method: Sixty male Albino Wistar rats were subjected for a surgical tooth extraction of upper 1stmolar of both sides (right side was considered as experimental site, while left be the
... Show MoreBackground: Presence of maxillary sinus septa has been known to be a complicating factor for sinus elevation procedure and implant placement in posterior maxilla. The maxillary sinuses septa are thin walls of cortical bone inside the sinus. They vary in number, location, and height. This study aimed to discover the accuracy of Spiral Computed Tomographic Scan in evaluation the maxillary sinus septa (prevalence, location, height) in subjects with dentate, partially edentulous and completely edentulous maxilla. Material and method: This study included (267) subjects ranged from (20-70 years), (132) male and (135) female divided into three groups, (97) fully dentate group, (102) partially edentulous group and (68) completely edentulous group w
... Show MoreThe objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show MoreThe process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel
... Show MoreLinear programming currently occupies a prominent position in various fields and has wide applications, as its importance lies in being a means of studying the behavior of a large number of systems as well. It is also the simplest and easiest type of models that can be created to address industrial, commercial, military and other dilemmas. Through which to obtain the optimal quantitative value. In this research, we dealt with the post optimality solution, or what is known as sensitivity analysis, using the principle of shadow prices. The scientific solution to any problem is not a complete solution once the optimal solution is reached. Any change in the values of the model constants or what is known as the inputs of the model that will chan
... Show MoreAddressed the problem of the research is marked (experimentation in caves fee) concept and its role in experimentation deviate Display Num formal charges caves. The search came in four sections: general framework for research and identified the research problem and the need for him. With an indication of the importance of his presence. Then specify the search for the goals of (revealed the nature and role of experimentation in determining the nature of Manifesting fee documented on the walls of caves), followed by the establishment of the three search limits (objectivity, the temporal and spatial) were then determine the terms related to the title. Then provide the theoretical framework and indicators that resulted from academic theorizi
... Show MoreThe specialist researcher fined the relations between economic ideas with economic facts in his theory which called humanity building it is appeared clearly ( in Ibn Khalduons’ Muqaddimah) in a clothe of economic social phenomenon's as a systematical analysis in all fifty chapters of al Muqaddimah ,therefore this paper deal with Ibn Khalduon economic thoughts as important says which describe the society building in its economic subjective and examine the relationship between The dissert and the city within economic says which are cover the social analysis ,and determinate the analysis objects which clearly in this dualism model ,between the state and economic bas
... Show MoreAbstract: Thorough assessment of the Maxillary,Sinus is very important. Recently 3-dimensional imagewith Cone Beam Computed Tomography (CBCT) is very dependable in Maxillary Sinus diagnosis. The aim of this study is to: shade light on the role of (CBCT) diagnosis of the maxillary sinus anatomical variation and pathological finding among smokers and nonsmokers prior to maxillary sinus lift techniques. Materials and Method: In this study 60 males with age ranged between 20-50 years old, referred for (CBCT) assessment of maxillary sinus in the Specialist Health Center of AL-Sadder city. The scanning were performed using Kodak 9500 (CBCT), the KV was 90, mA10 and scanning time 10 s. Voxel size 0.3mm with( DICOM ) software on a multiplaner re
... Show MorePre-breakdown phenomenon was investigated within the two, non-mixed dielectric liquids; transformation oil and cresol. Finite element technique was used to follow the initiation and growth of plasma channels (streamer discharge) within pin-plane configuration. That was done for different spacing between the pin-electrode and the liquid-liquid interface. Streamer growth model assumed that, the streamer initiation occurs at the region of the highest value of electric field. Our study shows that the streamer initiates at the tip of the pin and growths toward the other electrode. The study shows, too, that the streamer path controlled by the difference of permittivity of the two liquids and spacing distance of the liquid-liquid interface fro
... Show More