oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 6 )

2018 ( 7 )

2017 ( 10 )

2016 ( 9 )

Custom range...

Search Results: 1 - 10 of 1258 matches for " Arif Baran "
All listed articles are free for downloading (OA Articles)
Page 1 /1258
Display every page Item
rac-(2R*,3S*,5S*,6R*,7S*,8S*)-7,8-Dichlorobicyclo[2.2.2]octane-2,3,5,6-tetrayl tetraacetate
Ertan Şahin,Arif Baran,Metin Balcı
Acta Crystallographica Section E , 2009, DOI: 10.1107/s160053680900484x
Abstract: The title compound, C16H20Cl2O8, contains a central bicyclo[2.2.2]octane skeleton with slightly twisted conformation. In this structure, the C—C bond lengths are in the range 1.525 (2)–1.552 (2) . Two sides of this skeleton have cis,cis acetoxy substituents and the Cl atoms have a trans arrangement. An extensive network of weak C—H...O interactions stabilizes the crystal structure.
Security Approaches in IEEE 802.11 MANET—Performance Evaluation of USM and RAS  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2014, DOI: 10.4236/ijcns.2014.79038
Abstract: Evaluation of IEEE 802.11 Mobile Ad Hoc Networks (MANET) security issues becomes significant concern for researchers since Denial of Service (DoS) attacks are recognized as one of the most harmful threats. A variety of security mechanisms are proposed to solve security dilemma in MANETs against different layers of DoS attacks. Physical Layer jamming attacks exhaust the victim’s network resources such as bandwidth, computing power, battery, etc. Unified Security Mechanism (USM) and Rate Adaptation Scheme (RAS) are two of the proposed methods by researchers against DoS attacks. USM and RAS mechanisms are simulated through OPNET simulator and Jamming Attack is generated on the network for each security mechanisms to compare specific performance metrics on the network.
Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83003
Abstract: The Gossip-Based Relay Protocol (GRP) is developed based on Ad Hoc on Demand Distance Vector Protocol (AODV) and proposed to increase the efficiency of package routing functionality in ad hoc networks through specific flooding scheme. This lightweight protocol reduced the collisions on the network through specific mechanisms. Request to Send/Clear to Send (RTS/CTS) mechanism is widely used in ad hoc environment with Temporarily Ordered Routing Algorithm (TORA) in order to eliminate collisions and allow access to the shared medium through proposed authentication methods. Since GRP contains specific mechanism of directed acyclic Graph (DAG) mechanism to mitigate overhead problem, RTS/CTS modified TORA might result in similar performance metrics. In this paper, TORA protocol has a modification of new RTS/CTS mechanism and has been simulated in order to be compared with proposed lightweight robust forwarding GRP scheme in terms of specific performance metrics such as network throughput, end-to-end delay and message flooding rate over the network through OPNET simulation package in order to expose the optimal solution to increase overall network throughput in ad hoc environment.
A Review of Anomaly Detection Systems in Cloud Networks and Survey of Cloud Security Measures in Cloud Storage Applications  [PDF]
Arif Sari
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.62015
Abstract: Cloud computing has become one of the most projecting words in the IT world due to its design for providing computing service as a utility. The typical use of cloud computing as a resource has changed the scenery of computing. Due to the increased flexibility, better reliability, great scalability, and decreased costs have captivated businesses and individuals alike because of the pay-per-use form of the cloud environment. Cloud computing is a completely internet dependent technology where client data are stored and maintained in the data center of a cloud provider like Google, Amazon, Apple Inc., Microsoft etc. The Anomaly Detection System is one of the Intrusion Detection techniques. It’s an area in the cloud environment that is been developed in the detection of unusual activities in the cloud networks. Although, there are a variety of Intrusion Detection techniques available in the cloud environment, this review paper exposes and focuses on different IDS in cloud networks through different categorizations and conducts comparative study on the security measures of Dropbox, Google Drive and iCloud, to illuminate their strength and weakness in terms of security.
International Law of the Sea: An Overlook and Case Study  [PDF]
Arif Ahmed
Beijing Law Review (BLR) , 2017, DOI: 10.4236/blr.2017.81003
Abstract: Sea is a large body of water that is surrounded by the land. It is a crucial part of human trade and commerce, voyage, mineral extraction, power generation and is also considered as an essential source of blue economy nowadays. International law of the sea is a law of maritime space that peacefully settles the global disputes on maritime boundary between or among the States and defines various jurisdictions of the maritime zones as well as the rights and obligations of the coastal States in these zones, especially with regard to the conservation of marine environment and biodiversity. The key objective of this piece of academic research is to demonstrate a brief overview of the international law of the sea with a special emphasize on the sources and legal framework of this law. This study also strives to focus the civil and criminal liability, jurisdictions, rights and obligations of the coastal states with regard to the different maritime zones. Furthermore this study delineates the rules and extent of using these maritime zones in the light of various treaty provisions on the international law of the sea where different adjudicated cases are also presented along with a profound scrutiny upon their fact, issues, judgment and reasoning.
Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite  [PDF]
Arif Sari
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.83004
Abstract: The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.
Flukonazol w grzybicy paznokci w wietle nowych badań klinicznych i farmakokinetycznych
Eugeniusz Baran,Wojciech Baran
Medical Mycology , 2001,
Abstract: Grzybicze zaka enia paznokci nadal s du ym problemem w dermatologii. Skuteczna terapia nie zawsze jest osi gana. W leczeniu ogólnym stosuje si itrakonazol, terbinafin i flukonazol. Flukonazol okaza si skutecznym lekiem w ró nego rodzaju grzybicach skóry. Wst pne obserwacje kliniczne równie wskazuj na warto tego preparatu w grzybicy paznokci. Studia farmakokinetyczne wykaza y, e przenika on szybko do paznokci d oni i stóp, gdzie pozostaje nawet 6 miesi cy po zakończeniu leczenia. Wyniki badań klinicznych potwierdzaj wysok skuteczno flukonazolu podawanego raz w tygodniu w leczeniu grzybicy paznokci r k i stóp.
Pimafucort . New approach to well-known drug Pimafucort . Nowe spojrzenie na dobrze znany lek
Eugeniusz Baran,Wojciech Baran
Medical Mycology , 2011,
Abstract: Pimafucort, which is composed of natamycin, neomycin and hydrocortisone is a valuable drug used in mixed infections caused by bacteria and fungi as well as in the onset of acute inflammation in different dermatoses (e.g. eczema or intertrigo with secondary contamination.
Academic Diversity and Assessment Process for CS Program Accreditation  [PDF]
Arif Bhatti, Irfan Ahmed
Creative Education (CE) , 2015, DOI: 10.4236/ce.2015.68080
Abstract: Underdeveloped countries have realized that the investment and the improvement in higher education are very important for the progress. This is evident in the number of new universities and institutes of higher learning are established in the last 20 - 30 years. In these universities, administrative processes are well established but academic processes are not. Accreditation bodies such as ABET do not dictate any specific assessment process but want each candidate program to have an assessment process that is reliable and can find out weak points in the program to continuously improve. This paper describes a successful assessment process adopted at College of Computers and Information Technology, Taif University.
Fault Tolerance Mechanisms in Distributed Systems  [PDF]
Arif Sari, Murat Akkaya
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2015, DOI: 10.4236/ijcns.2015.812042
Abstract: The use of technology has increased vastly and today computer systems are interconnected via different communication medium. The use of distributed systems in our day to day activities has solely improved with data distributions. This is because distributed systems enable nodes to organise and allow their resources to be used among the connected systems or devices that make people to be integrated with geographically distributed computing facilities. The distributed systems may lead to lack of service availability due to multiple system failures on multiple failure points. This article highlights the different fault tolerance mechanism in distributed systems used to prevent multiple system failures on multiple failure points by considering replication, high redundancy and high availability of the distributed services.
Page 1 /1258
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.