الآن تُعرض المواد 15 -- 34 من 5151

    • Assessment of Heavy Metals in Some Cosmetics Available in Saudi Arabia Locally Markets Using Neutron Activation Analysis 

      AL-Hawsawi, Aisha Mohammed Ladan; الهوساوي, عائشة بنت محمد لادان محمد; الخطيب, ليلى عبدالله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2017-09-27)
      Study Title: Assessment of Heavy Metals in Some Cosmetics Available in Saudi Arabia Local Market Using Neutron Activation Analysis Student: Aisha Mohammed Ladan AL-Hawsawi Main Supervisor: Dr. Laila Abdulla AL-Khatib, ...
    • Assessment of HER2/neu Gene Amplification Status in Breath Cancer Using Droplet Digital PCR Technique 

      عبد اللطيف, وصال رمضان أحمد فياض; Abdullatif, Wessal; عصيدي, مراد طاهر . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-25)
      تساؤلات الدراسة: 1. هل تقنية تفاعل البلمرة المتسلسل الرقمي فعالة وموثوقة لتقييم حالة تزايد عدد جين HER2/neu في سرطان الثدي؟ 2. هل هناك علاقة بين حالة HER2 والصفات الاكلينيكية للمرضى سرطان الثدي؟ 3. هل من الممكن استخدام ...
    • Characterization of hepatitis B virus intrahepatic covalently closed circular DNA and serum viral marker with acute and chronic HBV infection treated in Saudi patients 

      شبيطة, مي عمر توفيق; Shubaita, Mai Omar; الحبابي, فاضل حسن . مشرف رئيس; موسى’ أماني عبد الحكيم . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-06-17)
      Study population: This is a prospective study conducted include patient between 74 Saudi patients both six with age range 3-80 Y diagnosed with acute hepatitis B (AHB) or chronic hepatitis B infection (CHB) who admitted ...
    • Chromatographic analysis of the new designer drug βk-2C-B in human blood samples 

      البقمي, ندى بنت سعود منير المرزوقي; Albogami, Nada Saud; محمد, خالد مسعود . مشرف رئيس; الصبحي, حسن عتيق . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The major question: • Can we apply a LC-MS/MS assay for the analysis of βk-2C-B in human blood samples?
    • Comparison between Detection Techniques of Sildenafil 

      العبد الرحمن, مشاعل عبد المحسن سلطان; AL Abdulrahman, Meshael Abdulmohsen; آل سعد, محمد بن علي . مشرف رئيس; عجارم, منصور داحش . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-16)
      Study Questions: Main Question: Between the five analytical methods: UV-Vis, GC-MS/MS, LC-PDA, LC-MS/MS and UPLC -QTOF, which is the proper method for detecting counterfeited Sildenafil? Sub-Questions: 1. Is it possible ...
    • Comparison of Axial and Radial Techniques for ICP-OES to Estimate Cadmium and Lead levels in whole Blood 

      Alatawi, Asma Obaidullah Bin Salama; العطوي, أسماء بنت عبيد الله سلامة الرضمه; Ahmed, Hatem Abdel Moniem . Supervisor (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Which of the two analytical techniques under study is more accurate for the detection and quantification of cadmium and lead in human blood samples
    • COMPREHENSIVE FEASIBILITY STUDY FOR THE IMPLANTED MEDICAL DEVICES RESPOND TO CYBERSECURITY THREATS 

      صبره, محمد نور عبد الله محمود; SABRA, MOHAMMED NOUR ABDULLAH; الحربي, فهد محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: The main question has crystallized in the fact that the risks and threats of cyberspace that may expose many patients who use these (IMD) devices to health complications and then endanger ...
    • COMPUTATIONAL INTELLIGENT MECHANISM FOR BOOSTING CLUSTER-BASED WSN SECURITY 

      القحطاني, محمد مهدي سيف آل سلطان; ALQAHTANI, MOHAMMED MAHDI SAIF ALSULTAN; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Wireless sensor networks (WSNs) is growing exponentially due to its utilization in numerous applications such as environmental monitoring, habitat monitoring, military, medical and health monitoring. WSNs are ...
    • Computational Intelligent Mechanism for Boosting Cluster-Based WSN Security 

      سيف, عمر سلطان ياسين; SAIF, OMAR SULTAN Y.; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-17)
      Abstract Over the past few years' cloud computing has rapidly grown to a widely accepted IT model, and the dependency on the Internet technology has become an integral part of our life. governments and Organizations and ...
    • Cybercrime in Progress -Theory and Prevention of - Enabled Offenses Technology 

      العنزي, خلود بنت ربيع خلف; Al-Anazi, Khulood R.; العتيبي, غازي نوار . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      Background of study: Technology has become an integral part of our everyday lives. Today, the technological landscape is littered with devices of all shapes, sizes, and utilities, including mobile phones, tablet computers, ...
    • Data security and Privacy Module in Cloud Computing 

      عيسى, رامي عبد الرحمن أحمد; Essa, Rami Abdulrahman; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: What is the level of data security and privacy in cloud computing environments?
    • Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA) 

      Al-Sharhan, Norah; الشرهان, نورة بنت عبد الله (جامعة نايف العربية للعلوم الأمنية, 2017-06)
      Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ...
    • Detection and quantification of 4-fluoro MDMB-BUTINACA in Herbal Products using GC-MS 

      الحارثي, أحمد بن عيضه حامد الهميلي; AlHarthy, Ahmad Eadhah; كومار, ساشيل . مشرف رئيس; بكداش, عبد السلام أحمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2021)
      The main question of the study: • Is it possible to quantitatively and qualitatively determine 4-fluoro MDMB-BUTINACA in herbal product? By Using methanol extraction method and GC-MS technic? • From this question two ...
    • Detection of DDoS Attacks in Software Defined Networks 

      الراجحي, منصور سليمان; Alrajhi, Mansour Sulaiman; محمد, مصطفى جاد الحق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Due to its centralized and programmable simplicity, Software‐Defined Network (SDN) are considered as one of the most promising technologies for computer networks. There are many security issues in the traditional ...
    • Detection of Violent Language Against Saudi Arabia in Social Media Using Deep Learning 

      الغامدي, أثير بنت يحيى علي مسفر; Alghamdi, Atheer Yahya; عمي, مريم عبد القادر . مشرف (جامعة نايف العربية للعلوم الأمنية, 2020)
      The Main Question of The Study: Does the use of sequential model based on deep learning yield to accurate and effective detection of offensive Saudi Arabic language?
    • Developing a Drug Delivery System for Pregabalin by Nanoparticles 

      Alanoud, Mosa Alasiri; العسيري, العنود بنت موسى علي العزاني; الورثان, عبد الرحمن بن عبد الله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018)
      Study Title: Developing a Drug Delivery System for Pregabalin by Nanoparticles. Student: Alanoud Mosa Alasiri Supervisor: Dr. Abdul-Rahman Al-Warthan Co-Supervisor: Dr. Abdul-Wali Ajlouni. Study Questions: Main ...
    • Developing a Network-Based Botnet Detection Systems Using Machine Learning 

      العنزي, مشعل فرحان نافع; AL-Anazi, Meshal Farhan; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Abstract: Botnet is considered a multifunctional malware. It can be leveraged by attackers to launch variety of malware attacks such as click fraud, DDOS, spam, etc. Moreover, the botnets pretend the normal traffic by ...
    • Developing an Analytical Method for the Analysis of AMB-FUBINACA in Mice Brain using GC-MSMS 

      الغامدي, ملاك بنت عبد الرحيم سعيد آل عبد الرحيم; Al-Ghamdi, Malak Abdulrahim; بكداش, عبد السلام أحمد . مشرف رئيس; كومار, ساشيل . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2020)
      The main question of the study: Is it possible to determine the FUB-AMB quantitatively and qualitatively in mice brain tissue? From this question three key questions emerge: - How efficient is the extraction method of ...
    • Developing Malware Detection System Based on Behavioral Aspects 

      العوفي, محمد أحمد ناهر الكريثي; ALAUFI, MOHAMMAD AHMED; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Nowadays, the importance of malware analysis has become essential for the antivirus companies to detect various types of malware based on their finding, analyzing malware helps to assess damage, internet ...
    • Developing Security Strategy for “Just Walk Out” Technology 

      AlOmairy, Eman Mohammed Abdullah; العميري, إيمان محمد عبدالله; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ...