Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreEsculin (ESCN) is used in the pharmaceutical industry with intravenous effect, stimulant and anti-inflammatory capillaries, like vitamin P. It is a significant component of many anti-inflammatory remedies such as esqusan, esflazid and anavenol [14]. It is also found in numerous other remedies available in the market such as proctosone, anustat, and ariproct.
To determine experimental conditions, to elucidate retention behavior of esculin in HILIC mode. Moreover, to suggest new ways to separate and determinate esculin in ointments.
Two hydrophilic c
Structural buildings consist of concrete and steel, and these buildings have confronted many challenges from various aggressive environments against the materials manufactured from them. It contains high water levels and buildings whose concrete cover may be damaged and thus lead to the deterioration and corrosion of steel. It was important to have an alternative to steel, such as the glass fiber reinforced polymer (GFRP), which is distinguished by its great effectiveness in resisting corrosion, as well as its strong tensile resistance. Still, one of its drawbacks is that it has a low modulus of elasticity. This research article aims to conduct a numerical study using the nonlinear fi
In this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u
... Show MoreDetermining the aerodynamic characteristics of iced airfoil is an important step in aircraft design. The goal of this work is to study experimentally and numerically an iced airfoil to assess the aerodynamic penalties associated with presence of ice on the airfoil surface. Three iced shapes were tested on NACA 0012 straight wing at zero and non-zero angles of attack, at Reynolds No. equal to (3.36*105). The 2-D steady state continuity and momentum equations have been solved utilizing finite volume method to analyze the turbulent flow over a clean and iced airfoil. The results show that the ice shapes affected the aerodynamic characteristics due to the change in airfoil shape. The experimental results show that the horn iced airfoil
... Show MoreThe experimental and numerical analysis was performed on pipes suffering large plastic deformation through expanding them using rigid conical shaped mandrels, with three different cone angles (15◦, 25◦, 35◦) and diameters (15, 17, 20) mm. The experimental test for the strain results investigated the expanded areas. A numerical solution of the pipes expansion process was also investigated using the commercial finite element software ANSYS. The strains were measured for each case experimentally by stamping the mesh on the pipe after expanding, then compared with Ansys results. No cracks were generated during the process with the selected angles. It can be concluded that the strain decreased with greater angles of con
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThis study aims to investigate the types of impoliteness strategies used in Putin's speech at the annexation ceremony. All of Putin's speeches were intentionally delivered to cause damage to the hearers' negative and positive faces. Culpeper's (2011) classifications of impoliteness, which consist of five strategies that are the opposite of politeness, were adopted. The data were collected from the President of Russia, providing a rich source for analysis. Qualitative and quantitative analyses were employed to achieve the study objectives. Qualitative analysis allowed for a detailed examination of the impoliteness strategies employed, while quantitative analysis provided a broader understanding of their frequency and distribution. Putin most
... Show More