RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Place Branding Strategy Using IDEA Model : Applying to Jeju Island

        Chaudhry,Jamil Ahmed,Suh,Yong Kun 韓國商品學會 2011 商品學硏究 Vol.29 No.6

        Jeju Island is a special self administrated province of South Korea, known for its clean environment, scenic landscape and legendary historic cultural background. It is a tourists heaven and destination of choice for visitors originating from mainland Korea, Japan, China and neighboring countries, who throng it in large groups to ignite their romantic appetite, add spice to their lives and strengthen their spiritual energies. However, its potential as an international tourist destination is still not fully recognized and realized. The paper suggests IDEA- a new personality brand model (Identity, Differentiation, Emotion bonding and Aura), to put Jeju at par with its competitors. If fully adopted and implemented, IDEA may catapult Jeju to new heights through harnessing measures revolving around Identity, differentiation, emotion bonding and aura.

      • KCI등재

        Impact of Terrorism on Tourism Product Utility: A Case of Taxila, Pakistan

        Chaudhry,Jamil Ahmed.Suh,Yong Kun 한국상품학회 2012 商品學硏究 Vol.30 No.4

        A tourism destination’s consumption depends upon a wide-ranging needs and motivations shaped by a complex mix of factors representing consumer’s social environment, personality, family or personal experiences and pleasure drives. Tourists like others put value on tranquility and safety for the enjoyment of the pleasures and activities offered by tourist destinations. Terrorism is causing significant decrease in tourists’ utility of tourism products. The evaluation of a tourism destination in terms of consumer utility loss can be effective for rehabilitation exercise and planning of resources. Pakistan is a frontline state in war on terror since September 11, 2001. Tourism industry is badly hit in the country as local and foreign tourists avoid travelling and visiting public places due to safety concerns. This study investigates terrorism impacts on consumer’s utility of Taxila, Pakistan. Taxila is a UNESCO listed archaeological heritage site and tourist destination having a number of Buddhist monasteries, excavated ruins of ancient cities and a site museum. The study uses consumers’usage data and terrorism causalities figures collected from Taxila Museum and international databases, respectively. The study focuses on terrorismincidents occurring allover country and its impact of local and foreign visitor arrivals at Taxila. The analysis of the data is carried out by using statistical concepts like ANOVA, multivariate regression and time series using SPSS 17 software. The result shows utility of Taxila by local and foreign visitor’s dropped signficantly. Moreover, foreigners displaymore sensitivity to frequency of terror incidents then locals, who react rather seriously to the intensity of such incidents.

      • KCI등재

        Place Branding Strategy Using IDEA Model: Applying to Jeju Island

        Chaudhry, Jamil Ahmed,서용건 한국상품학회 2011 商品學硏究 Vol.29 No.6

        Jeju Island is a special self administrated province of South Korea, known for its clean environment, scenic landscape and legendary historic cultural background. It is a tourists heaven and destination of choice for visitors originating from mainland Korea, Japan, China and neighboring countries, who throng it in large groups to ignite their romantic appetite, add spice to their lives and strengthen their spiritual energies. However, its potential as an international tourist destination is still not fully recognized and realized. The paper suggests IDEA- a new personality brand model (Identity, Differentiation, Emotion bonding and Aura), to put Jeju at par with its competitors. If fully adopted and implemented, IDEA may catapult Jeju to new heights through harnessing measures revolving around Identity, differentiation, emotion bonding and aura.

      • SCIESCOPUSKCI등재

        FACTORS AFFECTING THE LACTATION LENGTH AND MILK YIELD IN NILI-RAVI BUFFALOES

        Chaudhry, M.A. Asian Australasian Association of Animal Productio 1992 Animal Bioscience Vol.5 No.2

        The effect of certain factors such as sex of calf, status of buffalo, season of calving, parity and sire on lactation length and total lactation yield was studied in 391 Nili-Ravi buffaloes. The average lactation length was $301.73{\pm}1.87$ (mean $\pm$ SE) days with a range of 181 to 505 days whereas the average lactation yield was $2031.08{\pm}19.16kg$ and ranged from 1023 to 6535 kg for 984 lactations. The differences in the means of lactation length and lactation yield due to the sex of calf were significant (p<0.05). The status of buffaloes had a significant (p<0.05) effect on lactation length but its effect on lactation yield was non-significant. The season of calving had no effect on lactation length but it influenced the lactation yield significantly. The milk yield was highest ($2150.81{\pm}43.52kg$) in buffaloes which calved in spring and lowest ($1959.92{\pm}30.83kg$) in autumn. The effect of parity on both traits under study was significant (p<0.01). The maximum and minimum lactation lengths of $309.82{\pm}3.96$ and $284.16{\pm}7.17$ days were observed in the first and sixth lactations, respectively. The milk yield was maximum ($2150.38{\pm}58.79kg$) in the seventh lactation and minimum (1818.31 60.04 kg) in the sixth lactation. The influence of sire was significant on lactation length (p<0.05) and milk yield (p<0.01).

      • SCIESCOPUS

        Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

        Chaudhry, Shehzad Ashraf,Naqvi, Husnain,Shon, Taeshik,Sher, Muhammad,Farash, Mohammad Sabzinejad Springer-Verlag 2015 JOURNAL OF MEDICAL SYSTEMS Vol.39 No.6

        <P>Telecare medical information systems (TMIS) provides rapid and convenient health care services remotely. Efficient authentication is a prerequisite to guarantee the security and privacy of patients in TMIS. Authentication is used to verify the legality of the patients and TMIS server during remote access. Very recently Islam et al. (J. Med. Syst. 38(10):135, 2014) proposed a two factor authentication protocol for TMIS using elliptic curve cryptography (ECC) to improve Xu et al.'s (J. Med. Syst. 38(1):9994, 2014) protocol. They claimed their improved protocol to be efficient and provides all security requirements. However our analysis reveals that Islam et al.'s protocol suffers from user impersonation and server impersonation attacks. Furthermore we proposed an enhanced protocol. The proposed protocol while delivering all the virtues of Islam et al.'s protocol resists all known attacks.</P>

      • SCOPUSKCI등재

        Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

        Chaudhry, Junaid Ahsenali Korea Information Processing Society 2009 Journal of information processing systems Vol.5 No.2

        Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

      • SCISCIESCOPUS

        The adverse role of excess negative ions in reducing the photoluminescence from water soluble MAA-CdSe/ZnS quantum dots in various phosphate buffers

        Chaudhry, Madeeha,Lim, Dong-Kwon,Qamar, Raheel,Bhatti, Arshad Saleem Royal Society of Chemistry 2018 Physical chemistry chemical physics Vol.20 No.46

        <P>The use of CdSe/ZnS quantum dots in making biosensors or biomarkers requires them to be water soluble, which can be achieved by conjugating with MAA. We report observation of modulation in the photoluminescence intensities of MAA conjugated CdSe/ZnS QDs (MAA-QDs) that depended strongly on the types and quantity of negative ions present in various kinds of phosphate buffers. The deterioration of PL was attributed to the presence of excess ions in the media that altered the energy and occupation of HOMO and LUMO levels of MAA. Instantaneously, strong reduction in the PL intensity with pH was observed. MAA-QDs incubated for more than 24 hours in the phosphate buffer at pH ∼ 7.0-8.0 showed recovery and enhanced PL intensity, which was attributed to the presence of excess positive ions and a small amount of OH<SUP>−</SUP>. Saline buffers showed no significant recovery due to the presence of additional Cl<SUP>−</SUP> ions. Cyclic voltammetry (CV) and electrochemical impedance spectroscopy (EIS) measurements were successfully employed to determine the band edges of the MAA-QD system in the presence of excess positive or negative ions (Na<SUP>+</SUP>, H<SUP>+</SUP>, Cl<SUP>−</SUP>, and OH<SUP>−</SUP>) in the media. Thus, it is very important to have complete knowledge of the ions present in the buffer when using MAA-QDs for biomarking or biosensing applications.</P>

      • KCI등재

        Security Vulnerabilities in RFID Networks

        Chaudhry, Junaid Ahsenali,Lee, Malrey The Institute of Internet 2013 Journal of Advanced Smart Convergence Vol.2 No.2

        Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security. RFID devices are going to be ubiquitous applications that are used in different areas especially in the business because it simplifies many business transactions. However, security and privacy issues and risks are introduced by pervasiveness of RFID systems. In RFID systems, communication between tag and reader usually takes place via wireless communication. As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel. The computational resources in RFID tag are constrained and it is a big limitation that forces researcher to apply different mitigations compared to common security solutions. At the first part of this research, RFID architecture is introduced briefly. In this paper, the researcher explains existing security challenges in RFID networks then the effects of these threats on security and privacy of RFID are discussed. After analyzing security challenges of RFID networks, different countermeasures that are proposed by other researchers are discussed. At the end of this paper, future security challenges are discussed.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼