RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • A Novel Method for Avoiding Congestion in a Mobile Ad Hoc Network for Maintaining Service Quality in a Network

        Alattas, Khalid A. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.9

        Under the mobile ad-hoc network system, the main reason for causing congestion is because of the limited availability of resources. On the other hand, the standardised TCP based congestion controlling mechanism is unable to control and handle the major properties associated with the shared system of wireless channels. It creates an effect on the design associated with suitable protocols along with protocol stacks through the process of determining the mechanisms of congestion on a complete basis. Moreover, when bringing a comparison with standard TCP systems the major environment associated with mobile ad hoc network is regraded to be more problematic on a complete basis. On the other hand, an agent-based mobile technique for congestion is designed and developed for the part of avoiding any mode of congestion under the ad-hoc network systems.

      • A Hybrid Routing Protocol Based on Bio-Inspired Methods in a Mobile Ad Hoc Network

        Alattas, Khalid A International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.1

        Networks in Mobile ad hoc contain distribution and do not have a predefined structure which practically means that network modes can play the role of being clients or servers. The routing protocols used in mobile Ad-hoc networks (MANETs) are characterized by limited bandwidth, mobility, limited power supply, and routing protocols. Hybrid routing protocols solve the delay problem of reactive routing protocols and the routing overhead of proactive routing protocols. The Ant Colony Optimization (ACO) algorithm is used to solve other real-life problems such as the travelling salesman problem, capacity planning, and the vehicle routing challenge. Bio-inspired methods have probed lethal in helping to solve the problem domains in these networks. Hybrid routing protocols combine the distance vector routing protocol (DVRP) and the link-state routing protocol (LSRP) to solve the routing problem.

      • A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

        Omar Abdulrahmanal Alattas Alhashmi,Mohd Faizal Abdullah,Raihana Syahirah Abdullah International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.2

        The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.

      • KCI등재

        Evaluation of the Interventional Approaches in the Management of Cutaneous Leishmaniasis in Jazan: An Observational Study

        ( Hafiz A. Makeen ),( Mohammed A. Buraik ),( Santhosh Joseph Menachery ),( Khalid M. Alattas ),( Abdulkarim M. Meraya ) 대한피부과학회 2018 Annals of Dermatology Vol.30 No.5

        Background: Cutaneous leishmaniasis is a tropical infection of public health importance. Numerous treatment approaches are in practice with variable degree of success however its management has no universal consensus or practice guidelines to follow. Objective: Analyze the management of cutaneous leishmaniasis retrospectively at a central hospital of Jazan Province, Kingdom of Saudi Arabia to identify the current treatment pattern and compare the outcomes. Methods: This cross-sectional study was conducted based on the hospital records of patients who attended the dermatology clinic for cutaneous leishmaniasis during the year 2012 to 2015. Results: Forty three patients were included in the study. There was a male preponderance (65.1%) among the patients and 60.5% of them were of pediatric age group. Monotherapy was the initial choice for 58.1% of the patients. Intralesional sodium stibogluconate (SS-IL) was the most preferred treatment for initial therapy, as monotherapy and as part of combination therapy. A complete response was achieved in 22 patients (51.2%) with initial therapy. Among the different treatment groups, SS-IL+itraconazole showed sig-nificantly higher complete response rate compared to other treatments offered as initial therapy (p<0.01). Initial SS-IL monotherapy provided complete response in 41.2% patients receiving it, while itraconazole monotherapy provided complete response in 75% and 90.9% of the patients receiving initial itraconazole+SS-IL combination therapy with achieved complete response. Conclusion: The findings and observations suggest that initial combination therapy with SS-IL+itraconazole significantly improved the complete response rates and thus reduced the need for additional or prolonged therapies. (Ann Dermatol 30(5) 575∼580, 2018)

      • Screening for Lynch Syndrome in Young Colorectal Cancer Patients from Saudi Arabia Using Microsatellite Instability as the Initial Test

        Alqahtani, Masood,Grieu, Fabienne,Carrello, Amerigo,Amanuel, Benhur,Mashour, Miral,Alattas, Rabab,Al-Saleh, Khalid,Alsheikh, Abdulmalik,Alqahtani, Sarah,Iacopetta, Barry Asian Pacific Journal of Cancer Prevention 2016 Asian Pacific journal of cancer prevention Vol.17 No.4

        Background: Lynch Syndrome (LS) is a familial cancer condition caused by germline mutations in DNA mismatch repair genes. Individuals with LS have a greatly increased risk of developing colorectal cancer (CRC) and it is therefore important to identify mutation carriers so they can undergo regular surveillance. Tumor DNA from LS patients characteristically shows microsatellite instability (MSI). Our aim here was to screen young CRC patients for MSI as a first step in the identification of unrecognized cases of LS in the Saudi population. Materials and Methods: Archival tumor tissue was obtained from 284 CRC patients treated at 4 institutes in Dammam and Riyadh between 2006 and 2015 and aged less than 60 years at diagnosis. MSI screening was performed using the BAT-26 microsatellite marker and positive cases confirmed using the pentaplex MSI analysis system. Positive cases were screened for BRAF mutations to exclude sporadic CRC and were evaluated for loss of expression of 4 DNA mismatch repair proteins using immunohistochemistry. Results: MSI was found in 33/284 (11.6%) cases, of which only one showed a BRAF mutation. Saudi MSI cases showed similar instability in the BAT-26 and BAT-25 markers to Australian MSI cases, but significantly lower frequencies of instability in 3 other microsatellite markers. Conclusions: MSI screening of young Saudi CRC patients reveals that approximately 1 in 9 are candidates for LS. Patients with MSI are strongly recommended to undergo genetic counselling and germline mutation testing for LS. Other affected family members can then be identified and offered regular surveillance for early detection of LS-associated cancers.

      • Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

        Lama AlNabulsi,Sireen AlGhamdi,Ghala AlMuhawis,Ghada AlSaif,Fouz AlKhaldi,Maryam AlDossary,Hussian AlAttas,Abdullah AlMuhaideb International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.4

        The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼