الآن تُعرض المواد 140 -- 159 من 12862

    • Dactylography and Conformation of Identity 

      العميد. عبدالله بن محمد اليوسف; Abdullah ibn Mohammed Al-Yusuf (جامعة نايف العربية للعلوم الامنية, 2012)
      This book aims to present the science of dactylography to both the specialist in forensic investigation and non-specialists working in the field of crime investigation. It provides information and diagrams related to the ...
    • The Danger of Drugs and Psychotropic Substances and the Responsibility of Combating them 

      عطيات، عبد الرحمن شعبان; Abdulrahman Shaban Atiyat (جامعة نايف العربية للعلوم الامنيةNaif Arab University for Security Sciences, 2000)
    • Data Hiding Technique Based on Dynamic LSB 

      Al-Aidroos, Naziha M.; Mohammed, Marghny M.; Bamatraf, Mohammed A. (Naif Arab University for Security Sciences, 2011-12-11)
      In this paper, we propose steganographic technique on images to provide higher capacity of secret information as well as imperceptibility of stego image for secret communication. To cover and recover hidden information, ...
    • Data Mining Techniques for Medical Data Classification 

      Alickovic, Emina; Subasi, Abdulhamit (Naif Arab University for Security Sciences, 2011-12-11)
      Data mining is information extraction from database. In this paper, we use data mining techniques to get correct medical diagnosis. In this study different techniques presented to get better accuracy using data mining tools ...
    • Datura Metel: An Emergin Psychotropic Plant - A Mini Review 

      T. A., Owolarafe; M. M., Barau (Naif Arab University for Security Sciences, 2015-11-08)
      The use of plants parts as a psychoactive substance in an illicit way have being in existence over a long period mainly for religious purpose. In cities and towns in Africa, youths who are involved in various unholy ...
    • DBT10 Implementing of DBT 

      Khaliq, Muhammad (2015-01-29)
      Implementing a DBT Learning objectives- how to: • Implement a DBT in a regulatory framework • Establish who is responsible for implementation • Distribute and protect a DBT • Use a DBT to design and evaluate a physical ...
    • DBT3 Threat Assessment 

      Khaliq, Muhammad (2015-01-29)
    • DBT4 Considerations for decision on ATS or DBT2 

      Khaliq, Muhammad (2015-01-29)
    • DBT5 Description of a DBT 

      Khaliq, Muhammad (2015-01-29)
    • DBT6 Developing and maintaining a DBT rev 

      Khaliq, Muhammad (2015-01-29)
    • DBT7 Considerations for Developing a DBT 

      Khaliq, Muhammad (2015-01-29)
    • DBT8 What Might a DBT look lik 

      Khaliq, Muhammad (2015-01-29)
    • DBT9 Introduction to Group Exercise 

      Khaliq, Muhammad (2015-01-29)
      Learning Objectives Applying the understanding achieved up to this point, following the steps outlined in NSS 10, and using the country information provided, you will be able to: •Develop a DBT for a nuclear ...
    • Dealing with Fraud Crimes 

      عامر خضير الكبيسي وأخرون; Amer Khodair Kubaisi and others (Naif Arab University for Security Sciencesجامعة نايف العربية للعلوم الأمنية, 2006)
      This book contains a group of working papers for a number of researchers, which have been discussed in a seminar called “Dealing with fraud crimes: strengthen the cooperation between the government services and civil ...
    • Dealing with Web Services Composition at the Architechtural Level 

      Bennouar, Djamal; Bentlemsan, Kahdidja (Naif Arab University for Security Sciences, 2011-12-11)
      Design by Component composition using connectors as a glue to produce software system represents the fundamental practice in software Architecture. Software Architecture approaches use a component model which explicitly ...
    • Decision Trees for Hand-Written Arabic Words Recognition 

      Amrouch, Siham; Chefrour, Aida; Souici-Meslati, Labiba (Naif Arab University for Security Sciences, 2011-12-11)
      In this paper, we present a system based on decision trees for the off-line recognition of handwritten Arabic words. The aim of this work is to design and implement a system for the recognition of Algerian city names ...
    • Decrypting the Cipher Texts of RSA with Public-Key 

      Derdouri, Lakhdar; Saidi, Noureddine (Naif Arab University for Security Sciences, 2011-12-11)
      The RSA is based on a trapdoor one-way function which is easy to compute but is most hard to revert without knowing the trapdoor. A cryptanalysis, presented in this paper, consists in finding a new decrypt key which plays ...
    • Design and Implementation of RFID-Sensor Middleware Compliant with EPC Global Architecture Framework 

      Uddin, Md. Kafil; Hong, Bonghee (Naif Arab University for Security Sciences, 2011-12-11)
      This paper proposes a new RFID-Sensor Middleware System that is compliant with EPCglobal framework. It uses extended APIs for sensor tag management. In this paper, we describe the unique features of our middleware, its ...
    • Detecting and Reporting Child Abuse by Dentists Working in the United Arab Emirates 

      Al-Amad, Suhail H.; Awad, Manal A.; Al-Farsi, Laila H.; Elkhaled, Rawan H. (Naif Arab University for Security Sciences, 2015-11-08)
      Injuries (intentional and unintentional) are the most common cause of death in children. 1 Frequently, non-accidental injuries to children occur inside the child’s house, and the perpetrator is often one or more of the ...
    • Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA) 

      Al-Sharhan, Norah; الشرهان, نورة بنت عبد الله (جامعة نايف العربية للعلوم الأمنية, 2017-06)
      Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ...