الآن تُعرض المواد 409 -- 428 من 12995

    • Naif Arab University for Security Sciences (NAUSS): Pursuing excellence in security science education and research 

      Alshaer, Abdelrahman Ibrahim; Al jehni, Ali Bin Fayez (Naif Arab University for Security Sciences, 2014-09)
    • National Security as a Comprehensive Concept 

      الشقحاء، فهد بن محمد; Fahd M. Al-Shaqha (جامعة نايف العربية للعلوم الأمنيةNaif Arab University for Security Sciences, 2004)
      As a whole, the author demonstrates that the security per se commands crucial importance in the present age. In essence, it is considered as vital as food or drinking water. No wonder, the entire mankind is exerting all ...
    • Nature Inspired Intelligent Techniques for Problem Solving 

      Batouche, Mohamed; Meshoul, Souham (Naif Arab University for Security Sciences, 2010-12)
      Nature has always been a source of inspiration. Over the last few decades, it has stimulated research on new computing paradigms and has spawned the emergence of new fields like 'Nature Inspired Computing', 'Evolutionary ...
    • The Nature of Money Laundering Processes and Their Relation with Drug Diffusion Drug Diffusion 

      السيد، عادل حسن; Adel Hassan Al-Sayed (2008)
      Drug abuse has became an international phenomenon with different measurements, imposed itself on the attentions of the governments and peoples of different countries, the drug abuse’s international character is due to ...
    • Neural Network-Based Face Detection with Partial Face Pattern 

      Naji, Sinan; Zainuddin, Roziati; Zaid, Masoud; Eldouber, Ammar; Jallab, Hamid A. (Naif Arab University for Security Sciences, 2011-12-11)
      In this paper, we present a neural network-based method to detect frontal faces in grayscale images under unconstrained scene conditions such as the presence of complex background and uncontrolled illumination. The system ...
    • A New Architecture for Translation Engine Using Ontology: One Step Ahead 

      Kharbat, Faten (Naif Arab University for Security Sciences, 2011-12-11)
      Usually, translation process needs external information to help generating the accurate result of the target text. Analysing an input sequence in order to determine its grammatical structure with respect to a given formal ...
    • A New Classification of Non-Functional Requirements for Engineering the Development of Software Services and Service-Oriented Applications 

      Odeh, Yousra; Odeh, Mohammed (Naif Arab University for Security Sciences, 2011-12-11)
      The service-oriented model of computing is increasingly becoming the mainstream for developing complex software systems and in particular highly distributed and web-based systems. However, the classification and the ...
    • New Metal Complexes of Pyrimidine Azodye as a Pigment Synthesis, Spectral Studies, Thermal Analysis and Uses in Ink Synthesis 

      Hassan, Ali M.; Heakal, Bassem H.; Kehela, T. M.; Fouad, O. A.; Eldin, A. Mohy (Naif Arab University for Security Sciences, 2015-11-08)
      As a document examiner we are faced with some difficulties in the detection of occurrence the additions and alteration to the official and customary documents circulating among people up on dealing with different cases so ...
    • Node Selection Based on Energy Consumption in MANET 

      Jailani, Kadir; Ghazali, Osman; Firdaus, Muhammad; Hassan, Suhaidi (Naif Arab University for Security Sciences, 2011-12-11)
      In a Mobile Ad-Hoc Network, the mobility of a node is unpredictable. The mobility is considered as one of the characteristics of a wireless network. In addition, the energy constraint of the nodes must also be taken into ...
    • A Novel secure Algorithm Against Statistical Attacks Based on a 4D Tesseract 

      Alshahrani, Ali M. (2015-10-27)
      In this paper, innovative 4D tesseract-based solutions (T-key) are suggested, implemented, tested and shown to overcome the drawbacks of most existing algorithms. They are based on a symmetric block cipher technique and ...
    • Nuclear Security 

      مركز الدراسات والبحوث; Mahmoud Nasr El-Din and others (جامعة نايف العربية للعلوم الأمنية., 2007)
      Today the world witnesses an increasing evaporation of terrorism and subversive activities, which reach many areas around the world. For that, the international society is haunted by the obsession from the usage of the ...
    • Nuclear Security at Nuclear Installations 

      Shakoora, A. (جامعة نايف العربية للعلوم الأمنية, 2013-06)
      Nuclear Safety aims to protect people and the environment from accidents, plant malfunctions and human errors. It deals with the achievement of proper operating conditions, prevention of accidents or mitigation of accident ...
    • Nuclear Security Fundamentals Presentation for Trieste November 2014(rev) 

      MAN, Madalina (2015-01-29)
      Nuclear security focuses on the prevention of, detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or ...
    • Nuclear Security – What is it? 

      Khaliq, Muhammad (جامعة نايف العربية للعلوم الأمنية, 2013-06)
    • Obstacle Detection with Stereo Vision Based on the Homography 

      Baha, Nadia; Larabi, Slimane (Naif Arab University for Security Sciences, 2011-12-11)
      In this paper, we propose a simple method of obstacle detection that enables a mobile robot to locate obstacles in the indoor environment using an images pair from un-calibrated cameras. Using a set of features points that ...
    • On Finding the Best Number of States for a HMM-Based Offline Arabic Word Recognition System 

      Wahby, Talaat M.; Musa, Mohammed E. M.; Osman, Izzalding M. (Naif Arab University for Security Sciences, 2011-12-11)
      This paper describes a method to recognize off-line handwritten Arabic names. The classification approach is based on Hidden Markov models. We use a data set of 20 Arabic names. The system was trained using 2000 Hand written ...
    • On Internet Multicast Architectures Fully Distributed and Hierarchical Vs. Service-Centric 

      Said, Omar; Ghiduk, Ahmed; Aljahdali, Sultan (Naif Arab University for Security Sciences, 2011-12-11)
      There are two approaches for the multicast routing architecture. The first approach is a traditional multicast architecture that constructs and updates the multicast tree in distributed manner. The second and most recent ...
    • On The Application of Forensic Metallurgy in Post Blast Investigation 

      Daifalla, Tarek; Bahgat, A. (Naif Arab University for Security Sciences, 2007-11)
      Improvised Explosive Devices, or shortly IEDs, are often used by terrorists in committing bombing crimes, lifting behind quite subtle evidences that puzzle the crime scene investigators on their work to unravel the mystery ...
    • Operative Law of the Kingdom of Saudi Arabia on the Use of Fake Passport 

      الجمعة، سعد بن محمد; Sad M. Al-Juma (جامعة نايف العربية للعلوم الأمنيةNaif Arab University for Security Sciences, 2003)
      The present book represents an endeavor to reflect the danger associated with the use of forged or fake passport. This crime, asserts the author of the book, is both recurrent and frequent in our age. The book, as a whole, ...
    • Opinions in the Typical Preparation of Security People 

      الفريق يحىي المعلمي; Yahya almoalimi and others (1988)
      The interest of preparing the security man is one of the essential things to improve the performance in the security field, where the preparation of the security man is the essential factor to develop the police work and ...