Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show MoreThe aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
Abstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show MoreThis study aims to discuss the projects of poultry in Wasit province in 2013 and geographical distribution according to the type and contrast on the level of administrative units representing Districts and The reasons for this discrepancy, as well as knowledge of the factors affecting the distribution by the analysis and reasoning and description This study divided to the four themes, The first of the statement of nutritional importance and economic Poultry focused on the importance of various poultry products, The second one shows the relative position of the province of Wasit between the provinces of Iraq in poultry and production of eggs and meat farming projects, and then followed by the third one (theme) as it ensures the geographic
... Show MoreThis paper provides a review of scholarly research on the depiction of hostility in critical media discourse analysis. The study is intended to analyze how hostility is differently portrayed and manifested in media discourse. The review begins by defining the multifaceted concept of hostility, encompassing cognitive, emotive, and behavioral dimensions. It then outlines the systematic process used to identify, gather and purposely select 30 relevant articles to hostility in media discourse. The method involves selecting 100 initial articles and gradually refining them to 30 articles that specifically address the themes of racism, anger, hate speech, prejudice, and aggression. These articles are sourced from diverse academic journals
... Show MoreThere are many events which causes nonproductive time (NPT) in the drilling industry. The mostly effective in this NPT is pipe sticking event. A considerable amount of time and resources can be spent in efforts to free a stuck pipe. In addition, Unsuccessful fishing operations results in costly alternatives including side-tracking. The drilling in Khabaz oil field poses many operational challenges among of them stuck pipe , lost circulation, flow of salt water during drilling, and hole caving. Stuck pipe can be considered the quite difficult problem in Khabaz oil field due to associated incidents which lead to NPT activities.
Well Khabaz -34 was selected to study the problem of stuck pipe in this field. An analysis of stuck pipe event
There are many events which causes nonproductive time (NPT) in the drilling industry. The mostly effective in this NPT is pipe sticking event. A considerable amount of time and resources can be spent in efforts to free a stuck pipe. In addition, Unsuccessful fishing operations results in costly alternatives including side-tracking. The drilling in Khabaz oil field poses many operational challenges among of them stuck pipe , lost circulation, flow of salt water during drilling, and hole caving. Stuck pipe can be considered the quite difficult problem in Khabaz oil field due to associated incidents which lead to NPT activities.Well Khabaz -34 was selected to study the problem of stuck pipe in this field. An analysis of stuck pipe even
... Show More