RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCISCIESCOPUS

        On the contributions of different micromechanisms for enhancement in the strength of TI-6Al-4V alloy upon B addition: A nanomechanical analysis

        Seok, M.Y.,Zhao, Y.,Lee, J.A.,Mohamed, R.M.,Al-Harbi, L.M.,Al-Ghamdi, M.S.,Singh, G.,Ramamurty, U.,Jang, J.i. Elsevier Sequoia 2016 Materials science & engineering Structural materia Vol.649 No.-

        <P>The addition of small amount of boron to Ti and it alloys refines the as-cast microstructure and enhances the mechanical properties. In this paper, we employ nanoindentation on each of the constituent phases in the microstructure and 'rule-of-mixture' type analysis to examine their relative contributions to the strength enhancement in a Ti-6Al-4V alloy modified with 0.3 wt% B. Our results indicate to two main contributors to the relatively higher flow strength of B-modified alloy vis-a-vis the base alloy: (a) strengthening of alpha phase due to the reduction in the effective slip length that occurs as a result of the microstructural refinement that occurs upon B addition, and (b) composite strengthening caused by the TiB whiskers present in the alloy. (C) 2015 Elsevier B.V. All rights reserved.</P>

      • KCI등재

        Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques

        Sultan H. Almotiri,Mohd Nadeem,Mohammed A. Al Ghamdi,Raees Ahmad Khan 한국지능시스템학회 2023 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.23 No.3

        The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.

      • KCI등재

        An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

        Rooh Ullah,Beenish Ayesha Akram,Amna Zafar,Atif Saeed,Sultan H. Almotiri,Mohammed A. Al Ghamdi 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.5

        Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼