Naif ْAlamri - Academia.edu (original) (raw)

Papers by Naif ْAlamri

Research paper thumbnail of Job Stress Among The Nurses Of The Emergency Department At King Fahad Specialist Hospital In Buraidah City

CERN European Organization for Nuclear Research - Zenodo, Oct 25, 2022

Job stress describes the negative emotional and physical reactions that occur when the demands of... more Job stress describes the negative emotional and physical reactions that occur when the demands of a job do not match an employee's abilities, resources, or needs. Job stress was found to have dangerous effects not only on nurses' health but also on their ability to cope with the demands of their work. This research aimed to assess job stress among the nurses of the emergency department at King Fahad Specialist Hospital in Buraidah City in Saudi Arabia. This cross-sectional, descriptive research was implemented in October 2021. The study recruited a convenient sample of 80 nurses that consisted of most nurses working at the emergency department of King Fahad Specialist Hospital. An electronic questionnaire, which consisted of a sociodemographic data sheet and a job stress scale, was sent to the participating nurses. The highest levels of job stress were associated with having too much work to do and working under unreasonable deadlines in the clinical setting, while the lowest levels of job stress were associated with receiving appropriate recognition or rewards for good performance. Nurses generally suffered from a moderate level of job stress (M=3.32 ± 0.567/5). In conclusion, nurses who had less than one year of experience significantly had the lowest job stress. No other significant difference was detected in the level of job stress based on the emergency nurses' age, nationality, gender, marital status, position, or educational level. Hospitals should implement interventional programs to identify and relieve sources and consequences of stress on the emergency nurses.

Research paper thumbnail of Secure, Fast, and Efficient Handoff Protocols for Wireless Mesh Networks

University of Colorado Colorado Springs. Kraemer Family Library, May 1, 2018

Research paper thumbnail of The Experience of Undrgraduate Saudi Arabian International Students at a Canadian University

مجلة العلوم التربوية و النفسية, Jun 1, 2017

In presenting this thesis in partial fulfillment of the requirements for a Master degree from the... more In presenting this thesis in partial fulfillment of the requirements for a Master degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who supervised my thesis work or, in their absence, by the Head of the Department or the Dean of the College in which my thesis work was done. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to the University of Saskatchewan in any scholarly use which may be made of any material in my thesis. DISCLAIMER Reference in this thesis to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation or favoring by the University of Saskatchewan. The views and opinions of the author expressed herein do not state or reflect those of the University of Saskatchewan, and shall not be used for advertising or product endorsement purposes.

Research paper thumbnail of An Overview on Acute Epiglottitis Diagnosis and Management in Primary Health Care Center: A Literature Review

Received: 07 Jun 2020 Received in revised form: 30 Sep 2020 Accepted: 04 Oct 2020 Available onlin... more Received: 07 Jun 2020 Received in revised form: 30 Sep 2020 Accepted: 04 Oct 2020 Available online: 28 Oct 2020

Research paper thumbnail of The translucency of human teeth and its relation to esthetic restorative materials

International Journal Of Community Medicine And Public Health, 2021

The main factor that can determine the harmonization and depth of color restorations for the adja... more The main factor that can determine the harmonization and depth of color restorations for the adjacent other restorations or other teeth is the translucency of these restorations. Many factors can affect the translucency and color of the restoration material, including translucency parameter, lighting conditions, opacity, gloss, light scattering, and overall perception by the naked eye. Previous investigations have indicated that translucency is the main factor that can significantly contribute to the esthetic characteristics of the different dental restoration materials. In the present literature review, we have discussed the translucency of human teeth and its relation to esthetic restorative materials. Comparing the translucency of the different restoration materials with the naturally occurring human enamel is essential for adequate validation of their clinical application. It has been demonstrated that for 1 mm thick human enamel, a mean value for the translucency parameter of 1...

Research paper thumbnail of Massive Renal Intratubular Hemorrhage With Herniations into Renal Veins: Report of a Case

Urology Case Reports, 2015

Research paper thumbnail of UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks

2018 Wireless Days (WD), 2018

Wireless mesh networking (WMN) is a new technology aimed to introduce the benefits of using multi... more Wireless mesh networking (WMN) is a new technology aimed to introduce the benefits of using multi-hop and multi-path to the wireless world. However, the absence of a fast and reliable handoff protocol is a major drawback especially in a technology designed to feature high mobility and scalability. We propose a fast and efficient handoff authentication protocol for wireless mesh networks. It is a token-based authentication protocol using pre-distributed parameters. We provide a performance comparison among our protocol, UFAP, and other protocols including EAP-TLS and EAP-PEAP tested in an actual setup. Performance analysis will prove that our proposed handoff authentication protocol is 250 times faster than EAP-PEAP and 500 times faster than EAP-TLS. The significant improvement in performance allows UFAP to provide seamless handoff and continuous operation even for real-time applications which can only tolerate short delays under 50 ms.

Research paper thumbnail of Network Virtualization with OpenFlow for Large-Scale Datacenter Networks

Network virtualization is one of the key components for the multitenancy services in the datacent... more Network virtualization is one of the key components for the multitenancy services in the datacenter environment, where overlay layer 2-in-layer 3 tunneling protocols have gained wide traction. These overlay tunneling protocols assist in overcoming the scalability challenges associated with the traditional network virtualization primitives such as VLAN, and they enable tenants to use their own IP/MAC addresses while ensuring traffic isolation. However, the tunneling protocols have introduced compatibility and performance issues. This paper discusses the issues of the tunneling protocols and proposes a scalable edge-overlay solution for network virtualization in multi-tenant datacenters. The proposed solution leverages OpenFlow to control and forward the tenants’ traffic without using additional encapsulation. Also, it allows the tenants to use their IP/MAC addressing scheme. We have implemented and evaluated the proposed solution, and the results from the experiments demonstrate that...

Research paper thumbnail of Cyber anonymity based on software-defined networking and Onion Routing (SOR)

2017 IEEE Conference on Dependable and Secure Computing, 2017

Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and s... more Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service.

Research paper thumbnail of Job Stress Among The Nurses Of The Emergency Department At King Fahad Specialist Hospital In Buraidah City

CERN European Organization for Nuclear Research - Zenodo, Oct 25, 2022

Job stress describes the negative emotional and physical reactions that occur when the demands of... more Job stress describes the negative emotional and physical reactions that occur when the demands of a job do not match an employee's abilities, resources, or needs. Job stress was found to have dangerous effects not only on nurses' health but also on their ability to cope with the demands of their work. This research aimed to assess job stress among the nurses of the emergency department at King Fahad Specialist Hospital in Buraidah City in Saudi Arabia. This cross-sectional, descriptive research was implemented in October 2021. The study recruited a convenient sample of 80 nurses that consisted of most nurses working at the emergency department of King Fahad Specialist Hospital. An electronic questionnaire, which consisted of a sociodemographic data sheet and a job stress scale, was sent to the participating nurses. The highest levels of job stress were associated with having too much work to do and working under unreasonable deadlines in the clinical setting, while the lowest levels of job stress were associated with receiving appropriate recognition or rewards for good performance. Nurses generally suffered from a moderate level of job stress (M=3.32 ± 0.567/5). In conclusion, nurses who had less than one year of experience significantly had the lowest job stress. No other significant difference was detected in the level of job stress based on the emergency nurses' age, nationality, gender, marital status, position, or educational level. Hospitals should implement interventional programs to identify and relieve sources and consequences of stress on the emergency nurses.

Research paper thumbnail of Secure, Fast, and Efficient Handoff Protocols for Wireless Mesh Networks

University of Colorado Colorado Springs. Kraemer Family Library, May 1, 2018

Research paper thumbnail of The Experience of Undrgraduate Saudi Arabian International Students at a Canadian University

مجلة العلوم التربوية و النفسية, Jun 1, 2017

In presenting this thesis in partial fulfillment of the requirements for a Master degree from the... more In presenting this thesis in partial fulfillment of the requirements for a Master degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who supervised my thesis work or, in their absence, by the Head of the Department or the Dean of the College in which my thesis work was done. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to the University of Saskatchewan in any scholarly use which may be made of any material in my thesis. DISCLAIMER Reference in this thesis to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation or favoring by the University of Saskatchewan. The views and opinions of the author expressed herein do not state or reflect those of the University of Saskatchewan, and shall not be used for advertising or product endorsement purposes.

Research paper thumbnail of An Overview on Acute Epiglottitis Diagnosis and Management in Primary Health Care Center: A Literature Review

Received: 07 Jun 2020 Received in revised form: 30 Sep 2020 Accepted: 04 Oct 2020 Available onlin... more Received: 07 Jun 2020 Received in revised form: 30 Sep 2020 Accepted: 04 Oct 2020 Available online: 28 Oct 2020

Research paper thumbnail of The translucency of human teeth and its relation to esthetic restorative materials

International Journal Of Community Medicine And Public Health, 2021

The main factor that can determine the harmonization and depth of color restorations for the adja... more The main factor that can determine the harmonization and depth of color restorations for the adjacent other restorations or other teeth is the translucency of these restorations. Many factors can affect the translucency and color of the restoration material, including translucency parameter, lighting conditions, opacity, gloss, light scattering, and overall perception by the naked eye. Previous investigations have indicated that translucency is the main factor that can significantly contribute to the esthetic characteristics of the different dental restoration materials. In the present literature review, we have discussed the translucency of human teeth and its relation to esthetic restorative materials. Comparing the translucency of the different restoration materials with the naturally occurring human enamel is essential for adequate validation of their clinical application. It has been demonstrated that for 1 mm thick human enamel, a mean value for the translucency parameter of 1...

Research paper thumbnail of Massive Renal Intratubular Hemorrhage With Herniations into Renal Veins: Report of a Case

Urology Case Reports, 2015

Research paper thumbnail of UFAP: Ultra-fast handoff authentication protocol for wireless mesh networks

2018 Wireless Days (WD), 2018

Wireless mesh networking (WMN) is a new technology aimed to introduce the benefits of using multi... more Wireless mesh networking (WMN) is a new technology aimed to introduce the benefits of using multi-hop and multi-path to the wireless world. However, the absence of a fast and reliable handoff protocol is a major drawback especially in a technology designed to feature high mobility and scalability. We propose a fast and efficient handoff authentication protocol for wireless mesh networks. It is a token-based authentication protocol using pre-distributed parameters. We provide a performance comparison among our protocol, UFAP, and other protocols including EAP-TLS and EAP-PEAP tested in an actual setup. Performance analysis will prove that our proposed handoff authentication protocol is 250 times faster than EAP-PEAP and 500 times faster than EAP-TLS. The significant improvement in performance allows UFAP to provide seamless handoff and continuous operation even for real-time applications which can only tolerate short delays under 50 ms.

Research paper thumbnail of Network Virtualization with OpenFlow for Large-Scale Datacenter Networks

Network virtualization is one of the key components for the multitenancy services in the datacent... more Network virtualization is one of the key components for the multitenancy services in the datacenter environment, where overlay layer 2-in-layer 3 tunneling protocols have gained wide traction. These overlay tunneling protocols assist in overcoming the scalability challenges associated with the traditional network virtualization primitives such as VLAN, and they enable tenants to use their own IP/MAC addresses while ensuring traffic isolation. However, the tunneling protocols have introduced compatibility and performance issues. This paper discusses the issues of the tunneling protocols and proposes a scalable edge-overlay solution for network virtualization in multi-tenant datacenters. The proposed solution leverages OpenFlow to control and forward the tenants’ traffic without using additional encapsulation. Also, it allows the tenants to use their IP/MAC addressing scheme. We have implemented and evaluated the proposed solution, and the results from the experiments demonstrate that...

Research paper thumbnail of Cyber anonymity based on software-defined networking and Onion Routing (SOR)

2017 IEEE Conference on Dependable and Secure Computing, 2017

Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and s... more Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service.