Realizing robust interconnectivity in a rapidly changing network topology is a challenging issue. This problem is escalating with the existence of constrained devices in a vehicular environment. Several standards have been developed to support reliable communication between vehicular nodes as the IEEE 1609 WAVE stack. Mitigating the impact of security/mobility protocols on limited capability nodes is a crucial aspect. This paper examines the burden of maintaining authenticity service that associated with each handover process in a vehicular network. Accordingly, a network virtualization-based infrastructure is proposed which tackles the overhead of IEEE 1906 WAVE standard on constrained devices existed in vehicular network. The virtualized WAVE architecture migrates the overhead of authentication process to allocated physical resources devised in a logical network. The proposed infra- structure has managed to reduce the WAVE security overhead by 40%. In addition, the handover delay is minimized by 45% as the computation time associated with the authentication process is reduced.
The continuous growth in technology and technological devices has led to the development of machines to help ease various human-related activities. For instance, irrespective of the importance of information on the Steam platform, buyers or players still get little information related to the application. This is not encouraging despite the importance of information in this current globalization era. Therefore, it is necessary to develop an attractive and interactive application that allows users to ask questions and get answers, such as a chatbot, which can be implemented on Discord social media. Artificial Intelligence is a technique that allows machines to think and be able to make their own decisions. This research showed that the dis
... Show MoreIn this paper two modifications on Kuznetsov model namely on growth rate law and fractional cell kill term are given. Laplace Adomian decomposition method is used to get the solution (volume of the tumor) as a function of time .Stability analysis is applied. For lung cancer the tumor will continue in growing in spite of the treatment.
The current research was aimed at the following:
1. Measurement of Personality Type Observer of the University students.
2. Identify the differences in Personality Type Observer among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary)
3. Measurement of Withdrawal of the University students.
4. Identify the differences in Withdrawal among the University students according to variable of Sex (male / female). And according to variable of Specialization (scientific / literary).
5. Identify the relationship between Personality Type Observer and Withdrawal.
To achieve this aims of the research, the researchers set up the instrument is scale
The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged
... Show MoreA new panel method had been developed to account for unsteady nonlinear subsonic flow. Two boundary conditions were used to solve the potential flow about complex configurations of airplanes. Dirichlet boundary condition and Neumann formulation are frequently applied to the configurations that have thick and thin surfaces respectively. Mixed boundary conditions were used in the present work to simulate the connection between thick fuselage and thin wing surfaces. The matrix of linear equations was solved every time step in a marching technique with Kelvin's theorem for the unsteady wake modeling. To make the method closer to the experimental data, a Nonlinear stripe theory which is based on a two-dimensional viscous-inviscid interac
... Show MoreDue to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
The present investigation focuses on the response of simply supported reinforced concrete rectangular-section beams with multiple openings of different sizes, numbers, and geometrical configurations. The advantages of the reinforcement concrete beams with multiple opening are mainly, practical benefit including decreasing the floor heights due to passage of the utilities through the beam rather than the passage beneath it, and constructional benefit that includes the reduction of the self-weight of structure resulting due to the reduction of the dead load that achieves economic design. To optimize beam self-weight with its ultimate resistance capacity, ten reinforced concrete beams having a length, width, and depth of 2700, 100, and
... Show MoreIn this paper, we study, in details the derivation of the variational formulation corresponding to functional with deviating arguments corresponding to movable boundaries. Natural or transversility conditions are also derived, as well as, the Eulers equation. Example has been taken to explain how to apply natural boundary conditions to find extremal of this functional.