Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
Rheumatoid arthritis is an inflammatory chronic disease with an autoimmune pathogenesis. To determine the role of Helicobacter pylori as a trigger agent, twenty five patients with rheumatoid arthritis of ages (15-47) years have been investigated and compared with twenty healthy individuals. All the studied groups were carried out to measure the rheumatoid arthritis (RA) IgM, anti-CCP antibody IgG and IgA by ELISA test and by measured anti-IgG antibody level of H. pylori by using ELISA and IFAT techniques. The present study showed significant differences (P< 0.05) of anti-H. Pylori in sera of RA patients than control group, this lead to suggest that H. pylori had a role in pathogenesis of RA.
Confocal microscope imaging has become popular in biotechnology labs. Confocal imaging technology utilizes fluorescence optics, where laser light is focused onto a specific spot at a defined depth in the sample. A considerable number of images are produced regularly during the process of research. These images require methods of unbiased quantification to have meaningful analyses. Increasing efforts to tie reimbursement to outcomes will likely increase the need for objective data in analyzing confocal microscope images in the coming years. Utilizing visual quantification methods to quantify confocal images with naked human eyes is an essential but often underreported outcome measure due to the time required for manual counting and e
... Show MoreBackground: Improved glucose level control with insulin injections have allowed for the diabetic population to live longer and healthier lives. Unfortunately diabetes remains a worldwide epidemic disease with multiple health implications. Specifically, its effects upon fracture healing are compromised in diabetics with as high as 87% recovery delay relative to “healthy†counterparts. Current medical treatments for bone injuries have been largely focused on replacing the lost bone with allogenic or autogenous bone grafts, beta-tricalcium phosphate (β -TCP), a ceramic alloplast, has interconnected system of micropores, has been widely used as a biologically safe osteoconductive bone substitute. The aim of this study was histol
... Show MoreInvestigating the heavy metals in soil is important to the life of humans and living organisms. Diyala River Lower Reaches was chosen due to the changes in environmental characteristics that took place in recent years. Twelve sediment samples were collected from four different sites. The physical, and chemical properties and the concentrations of nine heavy metals were indicated. The results showed that the average concentrations of arsenic, copper, chromium, cobalt, iron, manganese, nickel, lead, and zinc are 8.5, 45.7, 538.5, 12.2, 5.07, 991.7, 183.5, 16.07, 136.5 ppm, respectively. They reflect contamination with arsenic, chromium, and nickel, while they are free of lead, and zinc contamination, according to the Environmental P
... Show MoreThis study accomplished to determine levels of salivary Alpha-Amylase (sAA) in Iraqi children with positive family history of hypertension, Hypertension was believed to be a risk factor in 18% of all deaths in 2010 (9.4 million globally). This study included one hundred children from primary school aged 6 to 13 years, with a focus in child welfare and family health history, with an emphasis on close relatives' hypertension reputations, with hypertension close relatives record categories identified by 1st and 2nd relatives, after documenting the full details, the burden was assessed for the children's families. The influence of age is confirmed by a correlation study of our own numbers, which shows a positive correlation. The disparity betwe
... Show MoreBackground: The study aimed to investigate the effect of different techniques of en masse retraction on the vertical and sagittal position, axial inclination, rate of space closure, and type of movement of maxillary central incisor. Materials and methods: A typodont simulation system was used (CL II division 2 malocclusion). Three groups were used group 1(N=10, T-loop), group 2(N=10, Time-Saving loop), and group 3(N=10, Microimplant). Photographs were taken before and after retraction and measurements were made using Autodesk AutoCAD© software 2010. Kruskal-Wallis one-way analyses of variance and Mann-Whitney U test (p?0.05) were used. Results: The rate of space closure showed no significant difference among the three groups (p?0.05), whi
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThis work evaluates the economic feasibility of various production scenarios for the Zubair reservoir in the Kifl oil field using cash flow and net present value (NPV) calculations. The Kifl field is an exploratory field that has not yet been developed or assessed economically. The first well was drilled in 1960, and three other wells were later drilled to assess the oil accumulation, so in this research, Different production scenarios were evaluated economically. These scenarios were proposed based on the reservoir model of the Zubair formation in the field. The research methodology used QUE$TOR software to estimate capital expenditures (CapEx) and operating expenditures (OpEx) based on field-level data, production prof
... Show More