Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
The aim of this paper is to approximate multidimensional functions by using the type of Feedforward neural networks (FFNNs) which is called Greedy radial basis function neural networks (GRBFNNs). Also, we introduce a modification to the greedy algorithm which is used to train the greedy radial basis function neural networks. An error bound are introduced in Sobolev space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result is published in [16]).
High vehicular mobility causes frequent changes in the density of vehicles, discontinuity in inter-vehicle communication, and constraints for routing protocols in vehicular ad hoc networks (VANETs). The routing must avoid forwarding packets through segments with low network density and high scale of network disconnections that may result in packet loss, delays, and increased communication overhead in route recovery. Therefore, both traffic and segment status must be considered. This paper presents real-time intersection-based segment aware routing (RTISAR), an intersection-based segment aware algorithm for geographic routing in VANETs. This routing algorithm provides an optimal route for forwarding the data packets toward their destination
... Show MoreAbstract:
This Research aims to define role of the system of evaluating the performance for higher leadership in determining the level of institutional work quality in the Ministry of Agriculture, by measuring system efficiency of evaluating the performance for higher leadership and its effect in institutional work quality, the searcher reached through the theoretical framing and involved studies to build default plan define the relation between Research variables formed from system of evaluating leadership performance as independent variable contains six subsidiary dimensions: (Polarization, evaluating the performance of personnel, training, motivation, se
... Show MoreThe quality of groundwater should be improved by keeping safe water sources from contaminants in protective way by doing regular measuring and checkup before it supplied for usage. Private Wells do not receive the same services that wells supplying the public do. Well owners are responsible for protecting their drinking water. This work was carried out in Badra city, Iraq from December 2017 to May 2018, six wells water were investigated to determine the general characteristics of wells as well as studying the effect of environmental factors on the quality of water. The average of six wells were eleven parameters that is out of permissible limits were EC, Sal., Alk., TH, TDS, Na, Ca, Cl, SO4, Fe, Zn (4402-5183 /cm, 2.76-3.9 ppt
... Show MoreBackground The application of nanotechnology to biomedical surfaces is explained by the ability of cells to interact with nanometric features. The aim of this study was to consider the role of nanoscale topographic modification of CPTi dental implant using chemical etching method for the purpose of improving osseointegration. Materials and methods: Commercial pure titanium rod was machined into 20 dental implants. Each implant was machined in diameter about 3mm, length of 8mm (5mm was threaded part and 3mm was flat part). Implants were prepared and divided into 2 groups according to the types of surface modification method used: 1st group (10 implant) remained without nano surface modification (control), 2nd group include (10 implant) etche
... Show MoreThis paper provides a review of scholarly research on the depiction of hostility in critical media discourse analysis. The study is intended to analyze how hostility is differently portrayed and manifested in media discourse. The review begins by defining the multifaceted concept of hostility, encompassing cognitive, emotive, and behavioral dimensions. It then outlines the systematic process used to identify, gather and purposely select 30 relevant articles to hostility in media discourse. The method involves selecting 100 initial articles and gradually refining them to 30 articles that specifically address the themes of racism, anger, hate speech, prejudice, and aggression. These articles are sourced from diverse academic journals
... Show MoreThere are many events which causes nonproductive time (NPT) in the drilling industry. The mostly effective in this NPT is pipe sticking event. A considerable amount of time and resources can be spent in efforts to free a stuck pipe. In addition, Unsuccessful fishing operations results in costly alternatives including side-tracking. The drilling in Khabaz oil field poses many operational challenges among of them stuck pipe , lost circulation, flow of salt water during drilling, and hole caving. Stuck pipe can be considered the quite difficult problem in Khabaz oil field due to associated incidents which lead to NPT activities.
Well Khabaz -34 was selected to study the problem of stuck pipe in this field. An analysis of stuck pipe event