Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
New algorithms to Enhanced Fused Images from Auto-Focus Images
...Show More Authors

Enhancing quality image fusion was proposed using new algorithms in auto-focus image fusion. The first algorithm is based on determining the standard deviation to combine two images. The second algorithm concentrates on the contrast at edge points and correlation method as the criteria parameter for the resulted image quality. This algorithm considers three blocks with different sizes at the homogenous region and moves it 10 pixels within the same homogenous region. These blocks examine the statistical properties of the block and decide automatically the next step. The resulted combined image is better in the contras

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Nonlinear Functional Analysis And Applications
NEW SEVEN-PARAMETER MITTAG-LEFFLER FUNCTION WITH CERTAIN ANALYTIC PROPERTIES
...Show More Authors

In this paper, a new seven-parameter Mittag-Leffler function of a single com-plex variable is proposed as a generalization of the standard Mittag-Leffler function, certain generalizations of Mittag-Leffler function, hypergeometric function and confluent hypergeometric function. Certain essential analytic properties are mainly discussed, such as radius of convergence, order, type, differentiation, Mellin-Barnes integral representation and Euler transform in the complex plane. Its relation to Fox-Wright function and H-function is also developed.

Preview PDF
Scopus (3)
Scopus
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
In vitro assessment of bracket adhesion post enamel conditioning with a novel etchant paste
...Show More Authors

Background: 37% phosphoric acid (PA) is the traditional enamel etching technique prior to bracket ‎adhesion, yet it has been implicated in numerous enamel injuries. The purpose of the current study was to create a calcium phosphate (CaP) etching paste in a ‎‎simplified capsule ‎formula that can underpin clinically ‎adequate bracket bond strength ‎without jeopardizing the ‎integrity of enamel upon ‎the debracketing procedure. Materials and Methods: micro-sized hydroxyapatite (HA) powder was mixed with 40% PA solution to prepare ‎experimental acidic CaP paste. Sixty human premolars were ‎assigned into two groups of 30 each. ‎Enamel conditioning was accomplished using 37% PA-gel‎ for control group and CaP paste for e

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sun May 15 2022
Journal Name
Al-kindy College Medical Journal
A serology conundrum – HIV infection in acute babesiosis infection could merely be a false positive result
...Show More Authors

Babesiosis is a tick-borne disease caused by Babesia microti. We present a case of false positive HIV in the setting of confirmed babesiosis infection. An understanding that patients with babesiosis can have a false positive HIV test result is important in management decisions.

 

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Surgery Case Reports
Myositis ossificans: A rare location in the foot. Report of a case and review of literature
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Journal Of Baghdad College Of Dentistry
Radiological age estimation using third molars mineralization in a sample attending orthodontic clinics (A retrospective study)
...Show More Authors

Background: The evaluation of the chronological age is a practical method in crime investigation field that assists in identifying individuals to treat them as underage or adult. This study aimed to assess the stages of third molars mineralization in relation to chronological age of Iraqi individuals, determine the gender differences and arches (maxillary/mandibular) differences.

Materials and Methods: A total of 300 orthopantomograms of orthodontic patients were collected according to specific criteria and evaluated visually. The developmental stages of maxillary and mandibular third molars were determined according to Demirjian method. T

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Nov 03 2022
Journal Name
Frontiers In Applied Mathematics And Statistics
Prey fear of a specialist predator in a tri-trophic food web can eliminate the superpredator
...Show More Authors

We propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.

View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
A political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons
...Show More Authors

A political perusal of Initiations in Declaring Middle East a District vacant of mass Destruction weapons

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2015
Journal Name
Journal Of Engineering
Mixed Convection Heat Transfer in a Vertical Saturated Concentric Annulus Packed with a Metallic Porous Media
...Show More Authors

Mixed convection heat transfer in a vertical concentric annulus packed with a metallic porous media and heated at a constant heat flux is experimentally investigated with water as the working fluid. A series of experiments have been carried out with a Rayleigh number range from Ra=122418.92 to 372579.31 and Reynolds number that based on the particles diameter of Red=14.62, 19.48 and 24.36. Under steady state condition, the measured data were collected and analyzed. Results show that the wall surface temperatures are affected by the imposed heat flux variation and Reynolds number variation. The variation of the local heat transfer coefficient and the mean Nusselt number are presented and analyzed. An empirical

... Show More
View Publication Preview PDF