LIVIVO - The Search Portal for Life Sciences

zur deutschen Oberfläche wechseln
Advanced search

Search results

Result 1 - 7 of total 7

Search options

  1. Article ; Online: AN IN-DEPTH VISION TO HARDWARE DESIGN SECURITY VULNERABILITIES

    Zainab Khalid Younis / Basim Mahmood

    Jordanian Journal of Computers and Information Technology, Vol 8, Iss 1, Pp 33-

    2022  Volume 44

    Abstract: Hardware plays a major role in our everyday life. Despite the technological thrive, there remain various security issues regarding hardware weaknesses that needed to be addressed carefully. Hence, an in-depth vision of the vulnerabilities that may exist ... ...

    Abstract Hardware plays a major role in our everyday life. Despite the technological thrive, there remain various security issues regarding hardware weaknesses that needed to be addressed carefully. Hence, an in-depth vision of the vulnerabilities that may exist in hardware design is delivered in this study by generating a network model that contains the most common weaknesses reported in common weakness enumeration (CWE). The main goal of the generated network is to deeply analyze the relations between different hardware designs and security weaknesses. Based on the conducted analysis, recommendations and suggestions are given to benefit many parties including hardware security developers. Accordingly, the analysis approach depends on different concepts that are inspired by the field of network science. The generated model is illustrated in a graph, wherein the nodes are the weaknesses, and the edges are created if two weaknesses have a relation to each other. Promising findings have been attained and can be observed in the given model. For instance, the weaknesses CWE-441, CWE-1189, CWE-276, and CWE-1304 have not been given enough attention by the CWE and should be highly considered by software developers. Moreover, a rank for the hardware vulnerabilities based on network metrics is provided and compared with the most recently announced list of top hardware weaknesses by CWE. It is found that only two weaknesses are in common between the two lists, which indicates that the CWE list does not highly consider the relations among the weaknesses. [JJCIT 2022; 8(1.000): 33-44]
    Keywords complex networks ; cwe vulnerabilities ; data analysis ; hardware vulnerabilities ; Information technology ; T58.5-58.64 ; Electronic computers. Computer science ; QA75.5-76.95
    Subject code 006
    Language English
    Publishing date 2022-03-01T00:00:00Z
    Publisher Scientific Research Support Fund of Jordan (SRSF) and Princess Sumaya University for Technology (PSUT)
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  2. Article ; Online: Analyzing Crime Networks

    Husam Sultan / Basim Mahmood

    Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 15, Iss 1, Pp 57-

    A Complex Network-Based Approach

    2021  Volume 73

    Abstract: This article analyzed the crime network of Nineveh province based on the concepts of Complex Networks. To this end, two networks were created; the first represented the crimes that were committed in Nineveh province, while the second was the network of ... ...

    Abstract This article analyzed the crime network of Nineveh province based on the concepts of Complex Networks. To this end, two networks were created; the first represented the crimes that were committed in Nineveh province, while the second was the network of crime regions. These two networks were visualized and then analyzed using network centrality measurements. The results showed that several pairs of crimes had strong relations to each other. Moreover, it was found that some crime regions were considered as the core of crimes in the province. The results also showed that few regions were considered as the most dangerous parts of the province and they had strong tendencies to replicate their behaviour to other regions. Finally, the authors believe this is the first kind of works that take the crime network of Nineveh province as a case study
    Keywords crime networks ; complex networks ; nineveh province ; Mathematics ; QA1-939 ; Electronic computers. Computer science ; QA75.5-76.95
    Language Arabic
    Publishing date 2021-06-01T00:00:00Z
    Publisher Mosul University
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  3. Article ; Online: The Impact of Mobility Models on the Consumption of Network Resources in the Internet of Things (IoT)

    Rasha Al-Jarah / Basim Mahmood

    Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 14, Iss 2, Pp 51-

    2020  Volume 69

    Abstract: Nowadays, the field of Internet of Things (IoT) has become a new trend and one of the most attractive areas of research. It has a wide range of applications; starting from smart devices to developing smart cities. The main issue in this kind of ... ...

    Abstract Nowadays, the field of Internet of Things (IoT) has become a new trend and one of the most attractive areas of research. It has a wide range of applications; starting from smart devices to developing smart cities. The main issue in this kind of applications is the limitation in network resources (e.g., energy, memory, connectivity, etc.). Most of the works in the literature deal with this issue in a traditional way. For instance, developing routing protocols that find the optimal path for data forwarding. This paper looks to this issue from a different angle. In this work, we aim at testing different mobility patterns and then investigate their impact of the consumption of network resources under particular distributions and data routing protocols. The aspect we aim to investigate and measure is the amount of data exchanged, which in turn affects the power and the memory consumption of a network. We also measure two more aspects; performance stability, and data coverage area. The results show that mobility models play a significant role in the overall network performance.
    Keywords complex networks ; human mobility model ; objects distribution ; routing protocols ; Mathematics ; QA1-939 ; Electronic computers. Computer science ; QA75.5-76.95
    Subject code 000
    Language Arabic
    Publishing date 2020-12-01T00:00:00Z
    Publisher Mosul University
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  4. Article ; Online: The Pandemic COVID-19 Infection Spreading Spatial Aspects

    Basim Mahmood / Marwah Dabdawb

    Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 14, Iss 1, Pp 159-

    A Network-Based Software Approach

    2020  Volume 170

    Abstract: Coronavirus or what has been termed COVID-19 is one of the infectious diseases that have been recently classified as a pandemic. Currently, it is considered as the activist and the most dangerous disease that is rapidly spreaded around the world causing ... ...

    Abstract Coronavirus or what has been termed COVID-19 is one of the infectious diseases that have been recently classified as a pandemic. Currently, it is considered as the activist and the most dangerous disease that is rapidly spreaded around the world causing thousands of death cases. COVID-19 spreads between people through the contact with the infected ones when they sneeze, cough, or droplets of saliva. In this article, we investigated the impact of the spatial aspects and the movement patterns on COVID-19 infection spreading. We considered three aspects, namely, mobility patterns, curfew (stay-at-home) impact, and the distribution of people within places. The results show that spatial aspects can be considered as one of the factors that play a significant role in spreading the virus.
    Keywords covid-19 ; infection spreading ; pandemic ; human mobility ; random movement ; Mathematics ; QA1-939 ; Electronic computers. Computer science ; QA75.5-76.95
    Language Arabic
    Publishing date 2020-05-01T00:00:00Z
    Publisher Mosul University
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  5. Article ; Online: Unsupervised Forgery Detection of Documents

    Mohammed Abdulbasit Ali Al-Ameri / Basim Mahmood / Bünyamin Ciylan / Alaa Amged

    Electronics, Vol 12, Iss 1682, p

    A Network-Inspired Approach

    2023  Volume 1682

    Abstract: The area of forgery detection of documents is considered an active field of research in digital forensics. One of the most common issues that investigators struggle with is circled around the selection of the approach in terms of accuracy, complexity, ... ...

    Abstract The area of forgery detection of documents is considered an active field of research in digital forensics. One of the most common issues that investigators struggle with is circled around the selection of the approach in terms of accuracy, complexity, cost, and ease of use. The literature includes many approaches that are based on either image processing techniques or spectrums analysis. However, most of the available approaches have issues related to complexity and accuracy. This article suggests an unsupervised forgery detection framework that utilizes the correlations among the spectrums of documents’ matters in generating a weighted network for the tested documents. The network, then, is clustered using several unsupervised clustering algorithms. The detection rate is measured according to the number of network clusters. Based on the obtained results, our approach provides high accuracy using the Louvain clustering algorithms, while the use of the updated version of the DBSAN was more successful when testing many documents at the same time. Additionally, the suggested framework is considered simple to implement and does not require professional knowledge to use.
    Keywords digital forensics ; forgery detection ; network science ; unsupervised learning ; Electronics ; TK7800-8360
    Subject code 006
    Language English
    Publishing date 2023-04-01T00:00:00Z
    Publisher MDPI AG
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  6. Article ; Online: Collaboration Networks

    Basim Mahmood / Nagham Sultan / Karam Thanoon / Dhiya Khadhim

    Al-Rafidain Journal of Computer Sciences and Mathematics, Vol 14, Iss 1, Pp 117-

    University of Mosul Case Study

    2020  Volume 133

    Abstract: Scientific research is currently considered as one of the key factors in the development of our life. It plays a significant role in managing our business, study, and work in a more flexible and convenient way. The most important aspect when it comes to ... ...

    Abstract Scientific research is currently considered as one of the key factors in the development of our life. It plays a significant role in managing our business, study, and work in a more flexible and convenient way. The most important aspect when it comes to scientific research is the level of collaboration among scientific researchers. This level should be maximized as much as possible in order to obtain more reliable solutions for our everyday issues. To this end, it is needed to understand the collaboration patterns among researchers and come up with convenient strategies for strengthening the scientific collaboration. The scientific collaboration among the University of Mosul researchers–which is our case in this study–has not yet been investigated or analyzed. In this work, we aim at revealing the patterns of the scientific collaboration of the scientific colleges in the University of Mosul. We generate a co-authorship network for the university; the generated network is based on the data we collected from each individual researcher. The generated co-authorship network reveals many interesting facts regarding the collaboration patterns among the university researchers.
    Keywords collaboration networks ; co-authorship networks ; complex networks ; university of mosul ; Mathematics ; QA1-939 ; Electronic computers. Computer science ; QA75.5-76.95
    Subject code 001
    Language Arabic
    Publishing date 2020-05-01T00:00:00Z
    Publisher Mosul University
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

  7. Article ; Online: Measurement of Surface Roughness of Copper Nickel Titanium Arch Wires at Dry and Wet Conditions

    Saba Ammar Mohammed, / Abeer Basim Mahmood / Iman I Al-Sheakli

    Journal of Research in Medical and Dental Science, Vol 7, Iss 6, Pp 21-

    An In vitro Study

    2019  Volume 26

    Abstract: Introduction: The first phase of orthodontic therapy depend on flexible archwires, usually ''Nickel-titanium'' alloy to relate. The substantially load during movement of the tooth. Copper has been additional to nickel-titanium arch wires, subsequent made ...

    Abstract Introduction: The first phase of orthodontic therapy depend on flexible archwires, usually ''Nickel-titanium'' alloy to relate. The substantially load during movement of the tooth. Copper has been additional to nickel-titanium arch wires, subsequent made an alloy with potential clinical benefit. Also, the surface, characteristics, for instance roughness surface, hardness of orthodontic arch wires, and topography are essential determinants of the efficiency of archwire-guided movement of the tooth. They besides affect the potential of corrosion and the aesthetics components of orthodontic. Aims and objective: This in vitro study was planned to assess the roughness of Copper Nickel Titanium arch wires from altered brands in dry and wet condition (acidic and neutral artificial saliva). Materials and methods: Three types of CuNiTi orthodontic archwires from different brands were used: CuNiTi (Ormco brand), CuNiTi (IOS brand) and CuNiTi (Orthotechnology brand). They were rectangular (0.018 × 0.025 inch) in cross section and cut into pieces of 25 mm in distance. Thrity pieces from each company were divided into three groups; first one was left in dry condition and the other two groups ten pieces for each group were submerged in artificial saliva ((pH=6.75 ± 0.015)) and ((pH=3.5 ± 0.015)) at 370C for 2 months. The atomic force microscope was used to assess surface analysis of very samples. Then, the obtained data were analyzed using ANOVA and Tukey's test. Results: After immersion period, CuNiTi wires from orthotechnology brand exhibited the highest roughness among the study groups. On, the hand, the minimum roughness was CuNiTi wires from Ormco rand when compared to equivalent archwires. However, statistically non-significant different was noticed in surface roughness between groups of archwires from different company at dry condition. On the other hand, a highly significant different was noticed in surface roughness between groups of archwires from different company at wet condition. Conclusion: The copper nickel titanium archwires from Ormco brand were the greatest and the most suitable alignment orthodontic archwires in term of the minimum roughness firstly and over the sequence of period of this study.
    Keywords copper nickel titanium arch wires ; atomic force microscope (afm) ; surface roughness ; artificial saliva ; Dentistry ; RK1-715 ; Medicine (General) ; R5-920
    Subject code 550
    Language English
    Publishing date 2019-12-01T00:00:00Z
    Publisher Amber Publication
    Document type Article ; Online
    Database BASE - Bielefeld Academic Search Engine (life sciences selection)

    More links

    Kategorien

To top