Now showing items 1-20 of 4779

    • ADAPTATIVE BLOCKCHAIN-BASED APPROACH FOR SECURE SMART HOMES 

      ALARABI, SHATHA AYED Naser; العرابي, شذى عايض ناصر; عمي, مريم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Internet of Things (IoT) security and privacy remain a major challenge, due to the huge scale and distributed nature of IoT networks. The core of the Internet of things is the sharing of information, where each sensor in ...
    • Analysis of toxic elements in human urine using inductively coupled plasma - optical emission spectrometry Comparison of liquid and dry spots for urine 

      Alatawi, Khetam Abdullah; العطوي, ختام عبدالله محمد; أحمد, حاتم عبد المنعم . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Study Title: Analysis of toxic elements in human urine using inductively coupled plasma - optical emission spectrometry. Comparison of liquid and dry spots for urine Presented by: Khetam Abdullah Alatawi Supervisor: Dr. ...
    • (Assessment of Cytotoxicity of AgNPs on Lung Cell Cultures (A549 

      حمدان, إيمان حمود فريح العماش; Hamdan, Eman Hamoud; الورثان, عبد الرحمن بن عبد الله . مشرف رئيس; العجلوني, عبد الوالي محمد سعيد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-16)
      Study Questions: Main Question: What is the difference between cytotoxicity of AgNPs synthesized by Chemical Methods and those synthesized Green Methods on human lung cells )A549)( BEAS-2B)? Sub-Questions 1. How to ...
    • Assessment of Heavy Metals in Some Cosmetics Available in Saudi Arabia Locally Markets Using Neutron Activation Analysis 

      AL-Hawsawi, Aisha Mohammed Ladan; الهوساوي, عائشة بنت محمد لادان محمد; الخطيب, ليلى عبدالله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2017-09-27)
      Study Title: Assessment of Heavy Metals in Some Cosmetics Available in Saudi Arabia Local Market Using Neutron Activation Analysis Student: Aisha Mohammed Ladan AL-Hawsawi Main Supervisor: Dr. Laila Abdulla AL-Khatib, ...
    • Assessment of HER2/neu Gene Amplification Status in Breath Cancer Using Droplet Digital PCR Technique 

      عبد اللطيف, وصال رمضان أحمد فياض; Abdullatif, Wessal; عصيدي, مراد طاهر . مشرف رئيس; مسعودي, صافية عبد السلام . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-25)
      تساؤلات الدراسة: 1. هل تقنية تفاعل البلمرة المتسلسل الرقمي فعالة وموثوقة لتقييم حالة تزايد عدد جين HER2/neu في سرطان الثدي؟ 2. هل هناك علاقة بين حالة HER2 والصفات الاكلينيكية للمرضى سرطان الثدي؟ 3. هل من الممكن استخدام ...
    • Comparison between Detection Techniques of Sildenafil 

      العبد الرحمن, مشاعل عبد المحسن سلطان; AL Abdulrahman, Meshael Abdulmohsen; آل سعد, محمد بن علي . مشرف رئيس; عجارم, منصور داحش . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2019-04-16)
      Study Questions: Main Question: Between the five analytical methods: UV-Vis, GC-MS/MS, LC-PDA, LC-MS/MS and UPLC -QTOF, which is the proper method for detecting counterfeited Sildenafil? Sub-Questions: 1. Is it possible ...
    • Computational Intelligent Mechanism for Boosting Cluster-Based WSN Security 

      سيف, عمر سلطان ياسين; SAIF, OMAR SULTAN Y.; أبو منصور, حسين يوسف . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-17)
      Abstract Over the past few years' cloud computing has rapidly grown to a widely accepted IT model, and the dependency on the Internet technology has become an integral part of our life. governments and Organizations and ...
    • COMPUTATIONAL INTELLIGENT MECHANISM FOR BOOSTING CLUSTER-BASED WSN SECURITY 

      القحطاني, محمد مهدي سيف آل سلطان; ALQAHTANI, MOHAMMED MAHDI SAIF ALSULTAN; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Wireless sensor networks (WSNs) is growing exponentially due to its utilization in numerous applications such as environmental monitoring, habitat monitoring, military, medical and health monitoring. WSNs are ...
    • Detection and Genotyping of STR loci in Saudi Breast Cancer Patients using Cell-free DNA (Cf-DNA) 

      Al-Sharhan, Norah; الشرهان, نورة بنت عبد الله (جامعة نايف العربية للعلوم الأمنية, 2017-06)
      Study Objectives: 1. Measure the Cf-DNA concentration in the plasma of breast cancer (BC) patients and healthy subjects. 2. Compare the concentration of plasma Cf-DNA in BC patients and healthy subjects, and evaluate ...
    • Detection of DDoS Attacks in Software Defined Networks 

      الراجحي, منصور سليمان; Alrajhi, Mansour Sulaiman; محمد, مصطفى جاد الحق . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Abstract Due to its centralized and programmable simplicity, Software‐Defined Network (SDN) are considered as one of the most promising technologies for computer networks. There are many security issues in the traditional ...
    • Developing a Drug Delivery System for Pregabalin by Nanoparticles 

      Alanoud, Mosa Alasiri; العسيري, العنود بنت موسى علي العزاني; الورثان, عبد الرحمن بن عبد الله . مشرف رئيس; العجلوني, عبدالوالي محمد . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-26)
      Study Title: Developing a Drug Delivery System for Pregabalin by Nanoparticles. Student: Alanoud Mosa Alasiri Supervisor: Dr. Abdul-Rahman Al-Warthan Co-Supervisor: Dr. Abdul-Wali Ajlouni. Study Questions: Main ...
    • Developing a Network-Based Botnet Detection Systems Using Machine Learning 

      العنزي, مشعل فرحان نافع; AL-Anazi, Meshal Farhan; جاد الحق, مصطفى . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-03-31)
      Abstract: Botnet is considered a multifunctional malware. It can be leveraged by attackers to launch variety of malware attacks such as click fraud, DDOS, spam, etc. Moreover, the botnets pretend the normal traffic by ...
    • Developing Malware Detection System Based on Behavioral Aspects 

      العوفي, محمد أحمد ناهر الكريثي; ALAUFI, MOHAMMAD AHMED; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2018-04-18)
      Abstract Nowadays, the importance of malware analysis has become essential for the antivirus companies to detect various types of malware based on their finding, analyzing malware helps to assess damage, internet ...
    • Developing Security Strategy for “Just Walk Out” Technology 

      AlOmairy, Eman Mohammed Abdullah; العميري, إيمان محمد عبدالله; عناب, نسرين محمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-06)
      On 2016, Amazon announced a new retail store: Amazon Go, the new type of store with no need to checkout. "Just Walk Out" technology is the name that amazon has launched on the technology used in its store. Amazon Go requires ...
    • The Effect of Allogeneic Bone Marrow Transplant (allo-BMT) on Human Deoxyribonucleic Acid (DNA) Profiling 

      Al-Saleh, Abrar Bader Khaled (2016)
      موضوع الدراسة: مقارنة بين السمات الوراثية من عينات الدم ومسحات الشدق ومسحات الجلد للمرضى الذين خضعوا لعملية زراعة النخاع العظمي. أهداف الدراسة: تهدف هذه الدراسة إلى: 1. تحديد الأنماط الوراثية للحمض النووي المستخلص من ...
    • EFFECT OF EYE PATHOLOGY ON THE IRIS RECOGNITION SYSTEM 

      AL SHEHR, WAUOOD; الشهري, وعود عبدالواحد فائز; الحربي, فهد محمد عباس . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-01)
      Nowadays, the application of biometric systems that aim to safeguard information and its supporting processes, systems and infrastructures are proliferating. Unfortunately, the iris recognition system has some weakness, ...
    • The Effect of Medicinal Herbs "Calligonum Comosum" and" Sanna Alexandrina" in Saudi Environment on Breast Cancer Cell Lines (MDA-MB-231) 

      الباز, عبير بنت صالح عثمان; Albaz, Abeer Saleh Othman; الغامدي, صالح بن محمد . مشرف رئيس; قصاب, أحمد شعبان . مشرف مساعد (جامعة نايف العربية للعلوم الأمنية, 2018-04-24)
      Research Problem: 1. What is the therapeutic effect of the medical herbs Calligonum comosum and Senna alexandrina on breast cancer cells represented by cancer cell line MDA-MB-231. 2. Does breast cancer cell line MDA-MB-231 ...
    • AN EFFECTIVE ALGORITHM FOR DETECTING ATTACKS IN WIRELESS SENSOR NETWORK (WSN) 

      Alolayan, Mohammed Hassan (2017)
      A Wireless Sensor Network (WSN) consists of sensor nodes which are deployed over a certain area for several applications. It is vulnerable to different types of attacks. Selective Forwarding and Black Hole attacks are two ...
    • An Effective Awareness Model for Phishing Prevention 

      ABU JARAD, NASSER MOHAMMAD HASAN; أبو جراد, ناصر محمد حسن; الشهري, حسن بن أحمد . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-04-07)
      Phishing is a fraudulent action to obtain sensitive information such as usernames or personal information. It is one of a social engineering techniques being used to delude non-technical users. They are often lured by ...
    • An Encryption Based Security Model for Preventing Phishing Attacks 

      مطاوع, ضياء الدين نصر عبد العظيم; Motawa, Dyaa Eldeen Nasr; الشريف, أحمد علي . مشرف (جامعة نايف العربية للعلوم الأمنية, 2019-05-05)
      Abstract Currently, Phishing is a type of attack in which cyber criminals tricks the victims to steal their personal and financial data. It has become an organized criminal activity. Spoofed emails claiming to be from ...