Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Worldwide attention is being focused on nanocrystalline zeolites and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR), Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM). The effect of aging time, silica to alumina ratio is studied and the results sh
... Show MoreEl tema de esta investigación está directamente relacionado con el papel del léxico en la enseñanza-aprendizaje del español como segunda lengua en el sistema de enseñanza universitariairaquí, donde se llevó a cabo la investigación empírica y la propuesta de criterios de la selección de léxico español.
Este estudio se ha centrado concretamente en los alumnos irakíes de nivel elemental que estudian elespañol como segunda lengua extranjera. Con el fin de conocer los estilos de enseñanza-aprendizaje del vocabulario practicado en las aulas, de determinar las faltas en la selección léxica y realizar propuestas de mejorar la competencia léxica, hemos efectuado el an
... Show MoreResumen
El trabajo se investiga en el realismo y la tradición social que incluye la tragedia Bodas de sangre, del autor español Federico García Lorca. A lo largo de estas páginas se da la luz sobre los temas, acciones, oraciones y palabras que pertenecen a la realidad de la vida española en general y sobre todo en territorio andaluz, en el que ocurren los sucesos de la obra. Así como las tradiciones sociales que el dramaturgo español contemporáneo abundando a lo largo de su texto, y que han sido tomadas de la herencia popular.
Literariamente, esta obra se clasifica como Tragedia Moderna, por la razón de que incorpora los elementos necesarios de d
... Show MoreHepatitis B is an inflammation of the liver that caused by Hepatitis B virus (HBV) which is DNA virus that infects the human and some kinds of animals such as chimpanzees and birds. This disease considered as the major disease of mankind and a serious global public health problem. HBsAg, HBeAg, HBcAb, HBeAb and HBsAb are markers used to detect the presence and the stage of infection. The current study included (181) individuals from both sexes, (137) males and (44) females. By ratio 3.11: 1.The mean age of patients 2.4033 ± 0.83519 (range 18-73) years as follows < 20 (11.6%), 21–40 (47.5%), 41–60 (29.8%) and > 60 (11.0%) . These patients are 73 (40.4%) Blood donors from Central Blood Bank, 88 (48.6%) Chronic kidney failure at Ibn –
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show More