RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCOPUSKCI등재

        Short-term Outcomes of Pylorus-Preserving Gastrectomy for Early Gastric Cancer: Comparison Between Extracorporeal and Intracorporeal Gastrogastrostomy

        Alzahrani, Khalid,Park, Ji-Hyeon,Lee, Hyuk-Joon,Park, Shin-Hoo,Choi, Jong-Ho,Wang, Chaojie,Alzahrani, Fadhel,Suh, Yun-Suhk,Kong, Seong-Ho,Park, Do Joong,Yang, Han-Kwang The Korean Gastric Cancer Association 2022 Journal of gastric cancer Vol.22 No.2

        Purpose: This study aimed to compare the surgical and oncological outcomes between totally laparoscopic pylorus-preserving gastrectomy (TLPPG) with intracorporeal anastomosis and laparoscopy-assisted pylorus-preserving gastrectomy (LAPPG) with extracorporeal anastomosis. Materials and Methods: A retrospective analysis was performed in 258 patients with cT1N0 gastric cancer who underwent laparoscopic pylorus-preserving gastrectomy using two different anastomosis methods: TLPPG with intracorporeal anastomosis (n=88) and LAPPG with extracorporeal anastomosis (n=170). The following variables were compared between the two groups to assess the postoperative surgical and oncological outcomes: proximal and distal margins, number of resected lymph nodes (LNs) in total and in LN station 6, operation time, postoperative hospital stay, and postoperative morbidity including delayed gastric emptying (DGE). Results: The average length of the proximal margin was similar between the TLPPG and LAPPG groups (2.35 vs. 2.73 cm, P=0.070). Although the distal margin was significantly shorter in the TLPPG group than in the LAPPG group (3.15 vs. 4.08 cm, P=0.001), no proximal or distal resection margin-positive cases were reported in either group. The average number of resected LN was similar in both groups (36.0 vs. 33.98, P=0.229; LN station 6, 5.72 vs. 5.33, P=0.399). The operation time was shorter in the TLPPG group than in the LAPPG (200.17 vs. 220.80 minutes, P=0.001). No significant differences were observed between the two groups in terms of postoperative hospital stay (9.38 vs. 10.10 days, P=0.426) and surgical complication rate (19.3% vs. 22.9%), including DGE (8.0% vs. 11.8%, P=0.343). Conclusions: The oncological safety and postoperative complications of TLPPG with intracorporeal anastomosis are similar to those of LAPPG with extracorporeal anastomosis.

      • Spatial Decision Support System for Residential Solar Energy Adoption

        Ahmed O. Alzahrani,Hind Bitar,Abdulrahman Alzahrani,Khalaf O. Alsalem International Journal of Computer ScienceNetwork S 2023 International journal of computer science and netw Vol.23 No.6

        Renewable energy is not a new terminology. One of the fastest growing renewable energies is solar energy. The implementation of solar energy provides several advantages including the reduction of some of the environmental risks of fossil fuel consumption. This research elaborated the importance of the adaption of solar energy by developing a spatial decision support system (SDSS), while the Residential Solar Energy Adoption (RSEA) is an instantiation artifact in the form of an SDSS. As a GIS web-based application, RSEA allows stakeholders (e.g., utility companies, policymakers, service providers homeowners, and researchers) to navigate through locations on a map interactively. The maps highlight locations with high and low solar energy adoption potential that enables decision-makers (e.g., policymakers, solar firms, utility companies, and nonprofit organizations) to make decisions. A combined qualitative and quantitative methodological approach was used to evaluate the application's usability and user experience, and results affirmed the ability of the factors of utility, usefulness, and a positive user experience of the residential solar energy adoption of spatial decision support system (RSEA-SDSS). RSEA-SDSS in improving the decision-making process for potential various stakeholders, in utility, solar installations, policy making, and non-profit renewable energy domains.

      • Phishing Attack Detection Using Deep Learning

        Alzahrani, Sabah M. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

      • KCI등재

        A framework of examining the factors affecting public acceptance of nuclear power plant: Case study in Saudi Arabia

        Alzahrani Salman M.,Alwafi Anas M.,Alshehri Salman M. 한국원자력학회 2023 Nuclear Engineering and Technology Vol.55 No.3

        The Saudi National Atomic Energy project aims to adopt peaceful nuclear technologies and be part of the country's energy mix. As emerging nuclear energy, it is essential to understand public concerns and acceptability of nuclear energy, as well as the factors influencing acceptance to develop nuclear energy policy and implement nuclear energy programs. The purpose of this study is to analyze the public attitudes and acceptance of nuclear energy among Saudi Arabian citizens by utilizing protection motivation theory and theory of planned behavior. A total of 1,404 participants answered a questionnaire which was distribute by convenience sampling approach. A Structural Equation Modeling framework was constructed and analyzed to understand public behavior toward building the country's first Nuclear Power Plant (NPP). Before analyzing the data, the model was validated. The research concluded that the benefits of nuclear power plants were essential in determining people's acceptance of NPPs. Surprisingly, the effect of the perceived benefits was found higher than the effect of the perceived risks to the acceptance. Furthermore, the public's participation in this study revealed that the NPPs location has a significant impact on their acceptance. Based on the finding, several policy implementations were suggested. Finally, the study's model results would benefit scholars, government agencies, and the business sector in Saudi Arabia and worldwide.

      • Culture Influence on Enterprise Planning Resource (ERP) Implementation In Saudi Arabia's Public Sector

        Alzahrani, Ahmed Omar International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.7

        Enterprise resource planning (ERP) is widely adopted among enterprises and organizations. In recent years, researchers have become increasingly interested in factors related to ERP implementation success. In this paper, top management members, IT professionals, and end-users were interviewed in the study. The study used Hofstede's main cultural dimensions as a theoretical framework to identify cultural characteristics and their influence on ERP implementation within public organizations in Saudi Arabia. The study followed a qualitative methodology approach to carry on the study to investigate the national culture characteristics in Saudi Arabia that may influence ERP implementation success. The study found some culturally related factors that could influence success in ERP implantation projects in Saudi Arabia..

      • Buffer Overflow Attack and Defense Techniques

        Alzahrani, Sabah M. International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.12

        A buffer overflow attack is carried out to subvert privileged program functions to gain control of the program and thus control the host. Buffer overflow attacks should be prevented by risk managers by eradicating and detecting them before the software is utilized. While calculating the size, correct variables should be chosen by risk managers in situations where fixed-length buffers are being used to avoid placing excess data that leads to the creation of an overflow. Metamorphism can also be used as it is capable of protecting data by attaining a reasonable resistance level [1]. In addition, risk management teams should ensure they access the latest updates for their application server products that support the internet infrastructure and the recent bug reports [2]. Scanners that can detect buffer overflows' flaws in their custom web applications and server products should be used by risk management teams to scan their websites. This paper presents an experiment of buffer overflow vulnerability and attack. The aims to study of a buffer overflow mechanism, types, and countermeasures. In addition, to comprehend the current detection plus prevention approaches that can be executed to prevent future attacks or mitigate the impacts of similar attacks.

      • Faculty Members' Knowledge and willingness to Implement the Universal Design for Learning for Students with Disabilities in Saudi Universities

        Alzahrani, Hassan M International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.10

        Many students with disabilities and special needs are enrolled in higher education, which substantiated the need for research regarding faculty members' knowledge and willingness to implement supportive strategies in higher education in Saudi Arabia. This study explored Saudi university faculty members' knowledge and willingness to apply UDL (Universal Design for Learning) principles in their teaching practice. Surveys were used for data collection for this descriptive research. The findings indicated faculty members felt that they were knowledgeable regarding UDL and were willing to use UDL principles in teaching their students. Furthermore, there were no statistically significant differences between faculty members' knowledge levels regarding UDL based on their current position and years of experience. The findings indicated there was a significant relationship between gender and knowledge, with males having a significantly higher mean knowledge, although further analyses revealed it was a small effect. Finally, the results suggest more years of experience are related to greater willingness to use UDL principles, and this is particularly true for those in a lecturing position. These findings could be helpful, particularly for the Ministry of Education in Saudi Arabia to shed light on faculty members' UDL knowledge. Further research is needed to substantiate the findings.

      • Adversarial Machine Learning: A Survey on the Influence Axis

        Alzahrani, Shahad,Almalki, Taghreed,Alsuwat, Hatim,Alsuwat, Emad International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.5

        After the everyday use of systems and applications of artificial intelligence in our world. Consequently, machine learning technologies have become characterized by exceptional capabilities and unique and distinguished performance in many areas. However, these applications and systems are vulnerable to adversaries who can be a reason to confer the wrong classification by introducing distorted samples. Precisely, it has been perceived that adversarial examples designed throughout the training and test phases can include industrious Ruin the performance of the machine learning. This paper provides a comprehensive review of the recent research on adversarial machine learning. It's also worth noting that the paper only examines recent techniques that were released between 2018 and 2021. The diverse systems models have been investigated and discussed regarding the type of attacks, and some possible security suggestions for these attacks to highlight the risks of adversarial machine learning.

      • The Effect of Using the Interactive Electronic Models in Teaching Mathematical Concepts on Students Achievement in the University Level

        Alzahrani, Yahya Mizher International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.5

        This study examines the effect of using interactive electronic models to teach mathematical concepts on students' achievement in the linear algebra course at university. The field sample consisted of 200 students divided into two equal groups, an experimental group of 100 students and a control group of 100 students. The researcher used an achievement test in some mathematical concepts related to linear algebra. The results of the study showed that there were statistically significant differences (0.05) between the average achievement scores of the experimental and control groups in the post application of the achievement test, in favor of the experimental group. The size of the influence of the independent factor on the results of the study, which is "interactive electronic forms", on the dependent factor, which is the students' academic achievement in the prepared test, had a very large effect. Also, the results of the study showed that there were statistically significant differences (0.05) between the mean scores of the experimental group in the pre and post applications of the achievement test, in favor of the post application. The researcher recommended the use of interactive electronic models in teaching mathematical concepts at the university level and diversifying the strategies of teaching mathematics, using technology to attract learners and raise their academic achievement.

      • KCI등재

        Incidental findings of temporomandibular joint osteoarthritis and its variability based on age and sex

        Adel Alzahrani,Sumit Yadav,Vaibhav Gandhi,Alan G. Lurie,Aditya Tadinada 대한영상치의학회 2020 Imaging Science in Dentistry Vol.50 No.3

        Purpose: This study investigated the prevalence of temporomandibular joint osteoarthritis (TMJ-OA) using the Research Diagnostic Criteria for Temporomandibular Disorders image analysis criteria, assessed the severity of incidental osteoarthritic changes affecting the TMJ, and evaluated the correlations of sex and age with the prevalence and severity of TMJ-OA. Materials and Methods: This retrospective study assessed 145 randomly selected cone-beam computed tomography scans (261 TMJs) from the authors’ institutional maxillofacial radiology archive following the application of inclusion and exclusion criteria. The criteria described by Ahmad et al. were used to determine whether each TMJ was affected by OA, and the severity of the osteoarthritic changes was scored for each joint based on the method described by Alexiou et al. The chi-square, McNemar, Bhapkar chi-square, and Stuart-Maxwell chi-square tests were applied to evaluate the significance of the relationships between variables (age and sex). Results: Sixteen TMJs (6.1%) had no OA, 74 (28.6%) were indeterminate for OA, and 171 (65.5%) had OA. Flattening and sclerosis were observed in 86.6% and 12.3% of cases, respectively, while resorption was observed in 7.3% of the joints. Only 21 (8.1%) of the examined TMJs had subchondral cysts. Erosion of the articular eminence was observed in 58 (22.1%) cases, while sclerosis and resorption were found in 68 (25.9%) and 16 (6.1%) TMJs, respectively. Conclusion: Female patients had a higher prevalence and severity of TMJ-OA than male patients. The prevalence and severity of TMJ-OA increased with age, with peaks in the fifth and seventh decades of life.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼