Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we propose different approaches and we analysis and evaluation of these mobile P2P network security issues and submit some proposal solutions to resolve the related problems with threats and other different attacks since these threats and attacks will be serious issue as networks are growing up especially with mobility attribute in current P2P networks.
This research examines the factors which influence pedestrian's walking speed in Baghdad. the variations in walking speed of pedestrians are related to pedestrian characteristics such as gender, age group, and clothing traditions. Using the established methodology, the counts of pedestrians were performed using manual and video counting. The case study was performed in two streets located in a highly crowded commercial zone at the city center of Baghdad: Al-Karada Dakhel and Al- Sina’a Street. Data were subjected to statistical analysis using IBM SPSS Statistics 19 software. It has been found that Iraqi pedestrians walk slower than other pedestrians in the developed countries or in the region with minimum walking speed of 29.85 m/min.
... Show MoreMany trials were made to prepare Tinidazole 2% as bioadhesive vaginal gels using different gel bases including hydroxypropyl methyl cellulose (3 and 4% w/w), methylcellulose (3 and 4%w/w) and carboxymethylcellulose (2 and 3% w/w) .Swelling index of the polymers,pH , viscosity , bioadhesive force , and in-vitro drug release to the simulating vaginal fluid (S.V.F.) were investigated for all the prepared bioadhesive gels . The mechanism of drug release from the gel bases was also investigated.
The results revealed that C MC 3% gave the highest viscosity and bioadhesive strength with the lowest release rate while lowest viscosity and bioadhesive force
... Show MoreImportant points were concluded from this analysis related with the presence of the same variable CEs within multiple isolates with different time points being under the selection and the location of SNPs within the conserved functional pattern of CEs. In the 40 isolates, 9 out of 39 variable CEs conducted with multiple isolates
Strengthening of composite beams is highly needed to upgrade the capacities of existing beams. The strengthening methods can be classified as active or passive techniques. Therefore, the main purpose of this study is to provide detailed FE simulations for strengthened and unstrengthened steel–concrete composite beams at the sagging and hogging moment regions with and without profiled steel sheeting. The developed models were verified against experimental results from the literature. The verified models were used to present comparisons between the effect of using external post-tensioning and CFRP laminates as strengthening techniques. Applying external post-tensioning at the sagging moment regions is more effective because of the e
... Show MoreArtificial neural networks usage, as a developed technique, increased in many fields such as Auditing business. Contemporary auditor should cope with the challenges of the technology evolution in the business environment by using computerized techniques such as Artificial neural networks, This research is the first work made in the field of modern techniques of the artificial neural networks in the field of auditing; it is made by using thesample of neural networks as a sample of the artificial multi-layer Back Propagation neural networks in the field of detecting fundamental mistakes of the financial statements when making auditing. The research objectives at offering a methodology for the application of theartificial neural networks wi
... Show MoreSummary:This article discusses the topic of phraseological units with the names of wild animals in the Russian and Arabic languages in the aspect of their comparative semantic and cultural analysis, since a comparative analysis of the meanings of phraseological units of the Arabic and Russian languages, detection of coincidences and differences in the compared languages, is an important method for studying linguoculturology, since phraseological units represent a reflection of culture in the language
A precise evaluation of caries excavation endpoint is essential in clinical and laboratory investigations. Caries invasion differentiates dentin into structurally altered layers. This study assessed these changes using Raman spectroscopy and Vickers microhardness. Ten permanent molars with occlusal and proximal carious lesions were assessed and compared at 130 points utilizing four Raman spectroscopic peaks: phosphate v1 at 960 cm−1, amide I (1650 cm−1), amide III (1235 cm−1) and the C-H bond of the pyrrolidine ring (1450 cm−1). The phosphate-to-amide I peak ratio and collagen integrity peak ratio (amide III: C-H bond) of carious zones were calculated and compared in both lesions. The former ratio was correlated to 130 Vicke
... Show MoreKE Sharquie, AA Noaimi, HG Mahmood, SM Al-Ogaily, Journal of Cosmetics, Dermatological Sciences and Applications, 2015 - Cited by 6