http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Seok, M.Y.,Zhao, Y.,Lee, J.A.,Mohamed, R.M.,Al-Harbi, L.M.,Al-Ghamdi, M.S.,Singh, G.,Ramamurty, U.,Jang, J.i. Elsevier Sequoia 2016 Materials science & engineering Structural materia Vol.649 No.-
<P>The addition of small amount of boron to Ti and it alloys refines the as-cast microstructure and enhances the mechanical properties. In this paper, we employ nanoindentation on each of the constituent phases in the microstructure and 'rule-of-mixture' type analysis to examine their relative contributions to the strength enhancement in a Ti-6Al-4V alloy modified with 0.3 wt% B. Our results indicate to two main contributors to the relatively higher flow strength of B-modified alloy vis-a-vis the base alloy: (a) strengthening of alpha phase due to the reduction in the effective slip length that occurs as a result of the microstructural refinement that occurs upon B addition, and (b) composite strengthening caused by the TiB whiskers present in the alloy. (C) 2015 Elsevier B.V. All rights reserved.</P>
Analytic Review of Healthcare Software by Using Quantum Computing Security Techniques
Sultan H. Almotiri,Mohd Nadeem,Mohammed A. Al Ghamdi,Raees Ahmad Khan 한국지능시스템학회 2023 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGE Vol.23 No.3
The core objective of this security research is to ensure that healthcare software (HS) is secure when operating on a fully functional quantum computer. Developers are constantly coming up with innovative methods to maintain usability while maximizing security. The degree of security is not as high as it should be despite numerous efforts made in this area by developers and security specialists. It is also crucial to conduct additional research on the best methods for enhancing and assessing the security of healthcare technologies. This study specifically aims to assess the security of HS during quantum computing (QC) operations. Based on the empirical analysis of a substantial amount of data, this study makes recommendations for creating a secure HS. In the quantum age, decision-makers frequently experience difficulties in integrating extremely secure software. This study aims for the inclusion of security-related aspects. This study also suggests utilizing a novel technique that evaluates healthcare software security (HSS) simultaneously using the analytic hierarchy process (AHP), fuzzy sets (FS), and a method for order of preference by similarity to an ideal solution (TOPSIS). The F-AHP and F-TOPSIS hybrid solution techniques were evaluated using 10 quantum security algorithms. The security assessment conclusions indicate that this cutting-edge hybrid technique is the most accurate and useful method to evaluate the security of an HS. Most importantly, these findings will benefit security management without jeopardizing end users.
An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks
Rooh Ullah,Beenish Ayesha Akram,Amna Zafar,Atif Saeed,Sultan H. Almotiri,Mohammed A. Al Ghamdi 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.5
Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.