RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Survivability Analysis of MANET Routing Protocols under DOS Attacks

        ( Sohail Abbas ),( Muhammad Haqdad ),( Muhammad Zahid Khan ),( Haseeb Ur Rehman ),( Ajab Khan ),( Atta Ur Rehman Khan ) 한국인터넷정보학회 2020 KSII Transactions on Internet and Information Syst Vol.14 No.9

        The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

      • KCI등재

        Diet-Right: A Smart Food Recommendation System

        ( Faisal Rehman ),( Osman Khalid ),( Nuhman Ul Haq ),( Atta Ur Rehman Khan ),( Kashif Bilal ),( Sajjad A. Madani ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.6

        Inadequate and inappropriate intake of food is known to cause various health issues and diseases. Due to lack of concise information about healthy diet, people have to rely on medicines instead of taking preventive measures in food intake. Due to diversity in food components and large number of dietary sources, it is challenging to perform real-time selection of diet patterns that must fulfill one`s nutrition needs. Particularly, selection of proper diet is critical for patients suffering from various diseases. In this article, we highlight the issue of selection of proper diet that must fulfill patients` nutrition requirements. To address this issue, we present a cloud based food recommendation system, called Diet-Right, for dietary recommendations based on users` pathological reports. The model uses ant colony algorithm to generate optimal food list and recommends suitable foods according to the values of pathological reports. Diet-Right can play a vital role in controlling various diseases. The experimental results show that compared to single node execution, the convergence time of parallel execution on cloud is approximately 12 times lower. Moreover, adequate accuracy is attainable by increasing the number of ants.

      • KCI등재

        There's No Such Thing as Free Lunch but Envy among Young Facebookers

        ( Tassawar Iqbal ),( Muhammad Tariq Yousafzai ),( Sabeen Ali ),( Kinza Sattar ),( Muhammad Qaiser Saleem ),( Usman Habib ),( Atta Ur Rehman Khan ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.10

        Facebook has quickly infused across cultures worldwide to become a common household term for diverse spectra of netizens, especially youngsters. Inherently, interactive in nature, Facebook provides a common cyber enabled platform for online interactions with social friends, living across the world. However, despite its merits, users also experience certain disadvantages, which include but are not limited to rise in feelings of social comparison, decline in self-esteem, contentment and general subjective well-being. This work aims to determine the role of Facebook in spreading envy and identify factors that trigger such emotions. Due to abductive nature of the study, we used pilot interviews and consulted relevant literature to formulate hypotheses. Further, we used deductive approach and conducted a survey. The results showed that frequent use of Facebook, particularly passive following is main predictor of envy, and social interaction is the biggest cause for development of envious feelings in Facebook users. However, insignificant variation was found while investigating relationship between envy and factors, such as pretentiousness, time spent, accomplishment, everything in life, likes on posts, popularity across genders, marital status and genre.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼