RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

        Omari, Ahmed H. Al,Alsariera, Yazan A.,Alhadawi, Hussam S.,Albawaleez, Mahmoud A.,Alkhliwi, Sultan S. International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.2

        Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

      • SCOPUSKCI등재

        ON A CLASS OF GENERALIZED FUNCTIONS FOR SOME INTEGRAL TRANSFORM ENFOLDING KERNELS OF MEIJER G FUNCTION TYPE

        Al-Omari, Shrideh Khalaf Korean Mathematical Society 2018 대한수학회논문집 Vol.33 No.2

        In this paper, we investigate a modified $G^2$ transform on a class of Boehmians. We prove the axioms which are necessary for establishing the $G^2$ class of Boehmians. Addition, scalar multiplication, convolution, differentiation and convergence in the derived spaces have been defined. The extended $G^2$ transform of a Boehmian is given as a one-to-one onto mapping that is continuous with respect to certain convergence in the defined spaces. The inverse problem is also discussed.

      • A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

        AL-Omari, Ahmad H.,Otair, Mohammed A.,Alzwahreh, Bayan N. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

      • SCOPUSKCI등재

        ON θ-($\mathcal{G}$, $\mathcal{H}$)-CONTINUOUS FUNCTIONS IN GRILL TOPOLOGICAL SPACES

        Al-Omari, Ahmad Korean Mathematical Society 2013 대한수학회논문집 Vol.28 No.2

        In this paper, we investigate some properties of ${\theta}$-($\mathcal{G}$, $\mathcal{H}$)-continuous functions in a grill topological spaces. Moreover, the relationships with other related functions are investigated.

      • SCOPUSKCI등재

        WEAK AND STRONG FORMS OF sT-CONTINUOUS FUNCTIONS

        AL-OMARI, AHMAD,NOIRI, TAKASHI,NOORANI, MOHD. SALMI MD. Korean Mathematical Society 2015 대한수학회논문집 Vol.30 No.4

        The aim of this paper is to present some properties of sT-continuous functions. Moreover, we obtain a characterization and preserving theorems of semi-compact, S-closed and s-closed spaces.

      • SCOPUSKCI등재

        GENERALIZED DERIVATIONS ON PRIME RINGS SATISFYING CERTAIN IDENTITIES

        Al-Omary, Radwan Mohammed,Nauman, Syed Khalid Korean Mathematical Society 2021 대한수학회논문집 Vol.36 No.2

        Let R be a ring with characteristic different from 2. An additive mapping F : R → R is called a generalized derivation on R if there exists a derivation d : R → R such that F(xy) = F(x)y + xd(y) holds for all x, y ∈ R. In the present paper, we show that if R is a prime ring satisfying certain identities involving a generalized derivation F associated with a derivation d, then R becomes commutative and in some cases d comes out to be zero (i.e., F becomes a left centralizer). We provide some counter examples to justify that the restrictions imposed in the hypotheses of our theorems are not superfluous.

      • KCI등재

        THE FORMS OF RHYME IN THE POETRY OF FATWA TUQAN

        Fatima Omary,Chung Nien-Yu 한국아랍어아랍문학회 2017 아랍어와 아랍문학 Vol.21 No.3

        The study aims to present the nature of rhythmic form based on rhyme employed by Fadwa Tuqan, through analyzing all her poem collections that stretches all phases of her creation, including (With Days on My Own), (I Found It), (Give Us Love), (In Front of the Close Door), (The Night and The Knight), (On The Top of The World Alone). The study will focus on the forms of rhyme in poet’s works in the field of musical construction. And the study will indicate the varieties of the form applied to Fadwa’s poetry. Furthermore, the researchers found out that Fadwa Tuqan is able to make use of the rich cultural heritage to serve and enhance her expressive influence. And those goals are achieved after using certain linguistic tools in her texts. And so was she able to form constant properties to show her talent, to establish her own rhythmic system revealing that she was benefited from long term of writing experience, which echos the nature of linguistic form changing from certain stylistic feature to another one. تتوخى هذه الدراسة تتبّع الظواهر الإيقاعية القائمة على نظام التقفية في شعر فدوى طوقان، مِن خلال استقراء نماذجها في ستة دواوين شعرية لها تُمثّل ثلاث مراحل للتطور الشعري عندها. وهي: (وحدي مع الأيام)، و(وجدتها)، و(أعطنا حباً)، و(أمام الباب المغلق)، و(الليل والفرسان)، و(على قمة الدنيا وحيداً). وتقف هذه الدراسة عند السمات الأسلوبية المتنوّعة بالانتقال مِن مرحلة إلى أخرى في رحلة فدوى الشعرية، على مستوى الموسيقى، بعد أن يعرض البحث الأمثلة المتجلّية في تنوّعات هذا النظام. يرى الباحثان في هذه الدراسة أن فدوى طوقان تستطيع أن توظّف المعطيات اللغوية لتخدم النص مِن الناحية التعبيرية والتأثيرية والجمالية. وذلك بأنها قادرة على تنويع طرائقها في توظيف التراث اللغوي لنصوصها، حتى إنها استطاعت أن تحول الإمكانات اللغوية الخاصة بها عن طريقة تبرز تطور قدرتها الشعرية، وبشكل أحدثت إيقاعاً متنامياً يكشف منه عن استفادة فدوى من تجربتها الطويلة في كتابتها الشعرية. ويتناسب مع تطوّر سماته المضمونية التي تحمله قصائدها، وبخاصّة في ما يرتبط بطبيعة محاولة الشاعرة في التركيب اللغوي– نظام التقفية– تبعاً للانتقال من أسلوب ما إلى أسلوب آخر.

      • SCOPUSKCI등재

        ESTIMATION OF A MODIFIED INTEGRAL ASSOCIATED WITH A SPECIAL FUNCTION KERNEL OF FOX'S H-FUNCTION TYPE

        Al-Omari, Shrideh Khalaf Qasem Korean Mathematical Society 2020 대한수학회논문집 Vol.35 No.1

        In this article, we discuss classes of generalized functions for certain modified integral operator of Bessel-type involving Fox's H-function kernel. We employ a known differentiation formula of Fox's H-function to obtain the definition and properties of the distributional modified Bessel-type integral. Further, we derive a smoothness theorem for its kernel in a complete countably multi-normed space. On the other hand, using an appropriate class of convolution products, we derive axioms and establish spaces of modified Boehmians which are generalized distributions. On the defined spaces, we introduce addition, convolution, differentiation and scalar multiplication and further properties of the extended integral.

      • SCOPUSKCI등재

        ON EXTREMALLY DISCONNECTED SPACES VIA m-STRUCTURES

        Al-Omari, Ahmad,Al-Saadi, Hanan,Noiri, Takashi Korean Mathematical Society 2019 대한수학회논문집 Vol.34 No.1

        In this paper, we introduce a modification of extremally disconnected spaces which is said to be m-extremally disconnected. And we obtain many characterizations of m-extremally disconnected spaces. The concepts of ${\ast}$-extremally disconnected spaces, ${\ast}$-hyperconnected spaces, and generalized hyperconnectedness are as examples for this paper.

      • KCI등재

        Stability and Optimal Harvesting in Lotka-Volterra Competition Model for Two-species with Stage Structure

        AL-OMARI, J. F. M. 대한수학회 2007 Kyungpook mathematical journal Vol.47 No.1

        In this paper, we consider a delay differential equation model of two competing species with harvesting of the mature and immature members of each species. The time delay in the model represents the time from birth to maturity of that species, which appears in the adults recruitment terms. We study the dynamics of our model analytically and we present results on positivity and boundedness of the solution, conditions for the existence and globally asymptotically stable of equilibria, a threshold of harvesting, and the optimal harvesting of the mature populations of each species.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼