الآن تُعرض المواد 169 -- 188 من 11719

    • Ear Prints and their impact as Criminal Evidence 

      ALzwae, Mashaallah O. (جامعة نايف العربية للعلوم الأمنية, 2019-06)
      Abstract Crime has developed as a result of scientific and technological progress. Because of this development, it can be impossible to identify the perpetrators by traditional means of proof. Traditional means of proof ...
    • Economic Consequences of Traffic Accidents 

      السيد، راضي عبد المعطي; Rady Abd Al Mo’ate Al Sayyed (2008)
      Traffic accidents and the resulting human and material losses are considered as major problems that communities face. Moreover, the increasing number of losses has negative impact on development, and leaves handicapped ...
    • The Effect of Allogeneic Bone Marrow Transplant (allo-BMT) on Human Deoxyribonucleic Acid (DNA) Profiling 

      Al-Saleh, Abrar Bader Khaled (2016)
      موضوع الدراسة: مقارنة بين السمات الوراثية من عينات الدم ومسحات الشدق ومسحات الجلد للمرضى الذين خضعوا لعملية زراعة النخاع العظمي. أهداف الدراسة: تهدف هذه الدراسة إلى: 1. تحديد الأنماط الوراثية للحمض النووي المستخلص من ...
    • Effect of Altitudinal and Seasonal Factors on Diatomological Mapping of Waterbodies : Implication in Drowning Investigations 

      Kaur, Amandeep; Singh, Rajvinder; Singh, Rajinder (جامعة نايف العربية للعلوم الأمنية, 2018-12)
      Abstract Diatoms are an essential part of forensic investigation in drowning cases. They are used to differentiate between ante-mortem and post-mortem drowning and to ascertain the site of drowning. However, to do ...
    • The Effect of Establishing Guilt using Modern Technology on Human Rights 

      Driss, Bakhouya (جامعة نايف العربية للعلوم الأمنية, 2017-12)
      Abstract: The use of modern technology has led to a scientific revolution in the field of establishing guilt. Consequently, this has given rise to a great debate about its legitimacy among criminal law scholars, especially ...
    • EFFECT OF EYE PATHOLOGY ON THE IRIS RECOGNITION SYSTEM 

      AL SHEHR, WAUOOD; الشهري, وعود عبدالواحد فائز; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-01)
      Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ...
    • The Effect of Medicinal Herbs "Calligonum Comosum" and" Sanna Alexandrina" in Saudi Environment on Breast Cancer Cell Lines (MDA-MB-231) 

      الباز, عبير بنت صالح عثمان; Albaz, Abeer Saleh Othman; الغامدي, صالح بن محمد . مشرف رئيس; قصاب, أحمد شعبان . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-24)
      Research Problem: 1. What is the therapeutic effect of the medical herbs Calligonum comosum and Senna alexandrina on breast cancer cells represented by cancer cell line MDA-MB-231. 2. Does breast cancer cell line MDA-MB-231 ...
    • The Effect of the Employment of Women on Family Cohesion Arab Society 

      حسون، تماضر محمد زهري; Tamader Zuhri Hasoon (جامعة نايف العربية للعلوم الامنيةجامعة نايف العربية للعلوم الامنية, 1993)
    • The Effect of the Foreign Workforce on Sociological Change in Arab Countries 

      القاضي، لبنى أحمد عبد الله; أمين، سمير، 1931-; Lubna Abdullah Al-Qadi (جامعة نايف العربية للعلوم الأمنيةNaif Arab University for Security Sciences, 1990)
    • AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN) 

      Alolayan, Mohammed Hassan (2017)
      A Wireless Sensor Network (WSN) consists of sensor nodes which are deployed over a certain area for several applications. It is vulnerable to different types of attacks. Selective Forwarding and Black Hole attacks are two ...
    • An Effective Awareness Model for Phishing Prevention 

      ABU JARAD, NASSER MOHAMMAD HASAN; أبو جراد, ناصر محمد حسن; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing is a fraudulent action to obtain sensitive information such as usernames or personal information. It is one of a social engineering techniques being used to delude non-technical users. They are often lured by ...
    • Effective Criminal Investigation 

      البشري، محمد الأمين; Mohammed Alameen Albushra (جامعة نايف العربية للعلوم الامنيةbook, 1998)
    • EFFICIENT APPROACH FOR DETECTING EXTREMIST ARABIC TEXTUAL CONTENTS IN WEBSITES 

      Alharbi, Mona Hajed Ghazi; الحربي, منى بنت هاجد غازي; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The internet and technology advances now days have motivated terrorist groups to publish articles and extremist thoughts over the internet through the websites, blogs and social media seeking to spread their extremist ...
    • Efficient Network Intrusion Detection Model Using Dynamic Machine Learning 

      السبيعي, نواف بن محمد عبد الله المحمدي; Alsubaie, Nawaf Mohammed; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Research topic: Efficient Network Intrusion Detection Model Using Dynamic Machine Learning
    • Elderly and Fear of Crime: Theory and Application 

      الطريف، غادة بنت عبد الرحمن; Ghada A. Al-Tiraif (جامعة نايف العربية للعلوم الأمنيةNaif Arab University for Security Sciences, 2007)
      Within the framework of its series of publications on crime prevention, NAUSS issued this important book which is authored by Dr. Ghada A. Al-Tiraif. The book provided convenient illumination on crime, fear of crime, ...
    • Elderly crimes in the Arab World 

      غانم، عبد الله عبد الغني; Abdulla Ghanim (جامعة نايف العربية للعلوم الامنيةNaif Arab University for Security Sciences, 1988)
      The increased care of criminal statistics caused to raise sum relationships between crime and several variables, most important one was age. Several studies and researches have discussed the relationship between criminals ...
    • Electronic Engineering and Its Traffic Services 

      الرشيدي، علي ضبيان; .Ali Rashidi (2009)
      This book aims to find a suggested program that uses electronic engineering to develop traffic services in the cities of Riyadh, Jeddah, and Dammam. The book has five chapters. The first chapter studies the problem of the ...
    • An Encryption Based Security Model for Preventing Phishing Attacks 

      مطاوع, ضياء الدين نصر عبد العظيم; Motawa, Dyaa Eldeen Nasr; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-05-05)
      Abstract Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from ...
    • Endothelial Gene Expression Profile of Placental Mesenchymal stem Cells (pMSCs) Immune Modulated in Diabetes Condition 

      خليفة, سندس عصام فهيم; Khalifa, Sondos Essam; أبو مرعي, محمد حسن . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-22)
      Study question: 1- Can placental mesenchymal stem cells (pMSCs) modify the harmful effects of monocytes and high glucose concentration on endothelial cell function? 2- Which genes in endothelial cells are modified under ...
    • An Enhanced Approach for DNS Pharming Detection 

      Al-Dossary, Fahad Badi Abdulmohassen Amari; الدوسري, فهد بادي عبدالمحسن العماري; الشريف, أحمد علي (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing attack has many time on sub attack under it, pharming is one of those attack which use the social engineering method to pinch user sensitive information. It is more advanced than normal phishing attack, in pharming ...