RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • An improved g-centroid location algorithm for Ptolemaic graphs

        Prakash Veeraraghavan 보안공학연구지원센터 2009 International Journal of Multimedia and Ubiquitous Vol.4 No.2

        We have presented an 2()Om time algorithm for locating the g-centroid for Ptolemaic graphs, where n is the number of edges and m is the number of vertices of the graph under consideration [6]. If the graph is sparse (i.e. =()mOn) then the algorithm presented will output the g-centroid in quadratic time. However, for several practical applications, the graph under consideration will be dense (i.e. 2()mOn) and the algorithm presented will output g-centroid in 4()On time. In this paper, we present an efficient 3()On time algorithm to locate the g-centroid for dense Ptolemaic graphs.

      • The Current State of Cyber-Readiness of Saudi Arabia

        Alhalafi, Nawaf,Veeraraghavan, Prakash International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.6

        The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.

      • Performance of a Wireless Sensor Network MAC Protocol with a Global Sleep Schedule

        Somnath Ghosh,Prakash Veeraraghavan,Samar Singh,Lei Zhang 보안공학연구지원센터 2009 International Journal of Multimedia and Ubiquitous Vol.4 No.2

        Medium access control protocols for wireless sensor networks are almost always designed to be energy efficient. One mechanism used to reduce energy expenditure is to periodically turn off the radio receivers of the sensor nodes in a coordinated manner. The nodes with radio receivers turned off are said to be in the sleep mode. Nodes form virtual clusters based on common sleep schedules. However, protocols like the widely used S-MAC may require some nodes to follow multiple sleep schedules causing them to wake up more often than the other nodes. This paper demonstrates in some wireless sensor networks using S-MAC, a significant proportion of the nodes may have to stay awake much longer than envisaged. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes. The modified version improves the energy efficiency and increases the life span of a wireless sensor network. The paper concludes with the result of simulation studies which indicate that the use of the proposed protocol is expected to increase the life time of wireless sensor networks significantly.

      • Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia

        Alhalafi, Nawaf,Veeraraghavan, Prakash International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.5

        Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.

      • Artificial Intelligence (AI) and Blockchain-based Online Payments in the Global World

        Ahlam Alhalafi,Prakash Veeraraghavan,Dalal Hanna International Journal of Computer ScienceNetwork S 2024 International journal of computer science and netw Vol.24 No.3

        Payment systems are evolving, and this study examines how blockchain and AI improve online transactional security and service quality. The study examines micro and macro payment systems, compares online, and offline methods all over the world. The study also examines how blockchain and AI affect payment system security, privacy, and efficiency globally and rapidly digitizing economy. Digital payment methods are growing all over the world with high literacy and digital engagement, but they face challenges. The research highlights cybersecurity threats and the need to balance user convenience and security. It suggests blockchain and AI improve online payment services, supporting the policies for different countries. In this extensive research survey, we compare and evaluate the strengths and weaknesses of various payment systems, their practicality, and their robustness. This study also examines how technological innovations and payment systems interact to reveal how blockchain and AI could transform the financial sector. It seeks to understand how technology-enhancing service quality can boost customer satisfaction and financial stability in the digital age. The findings should help policymakers, financial institutions, and technology developers optimize online payment systems for a more secure and efficient digital economy.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼