Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
Lying in Arthur Miller's The Crucible: A Pragmatic Study: هديل محمود إبراهيم , جمعه قادر حسين
...Show More Authors

Lying is a controversial issue as it is closely related to one's intended meaning to achieve certain pragmatic functions. The use of lying in literary works is closely related to the characters’ pragmatic functions as in the case of Miller's The Crucible where it is used as a deceptive complex phenomenon that cannot be observed out of context. That is, the use of lying as a deceptive phenomenon represents a violation to Grices's Maxims. Thus, the study aims to qualitatively examine the kinds of maxims being violated, the kinds of violations conducted, the strategies followed in the violations, and the pragmatic functions behind such violations across the different categories of lies. To this end, the (30) extracts fou

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Political Sciences Journal
The regional attitude towards the change in the Arab region: turkey as a case study
...Show More Authors

This research deals with the nature of the Turkish attitude towards the events of the Arab Spring which the Arab region witnessed recently, as this attitude is characterized by hesitation and utter confusion about those events at its beginning. However, the development of events and the consequent repercussions led the Turkish decision makers of the foreign policy to reconsider their attitude towards those events for political, economic, cultural and social motives.

View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
The Egyptian Journal Of Hospital Medicine
Study on Viral Infection and Related Parameters in A Sample of Diabetes Mellitus Type 2
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Iraqi Postgraduate Medical Journal
The polycystic ovary syndrome as a cause of increase in inflammatory markers and metabolic risks
...Show More Authors

BACKGROUND: Polycystic ovary syndrome(PCOS) is one of the most common endocrine disorder affecting women in reproductive age. No single etiologic factor fully accounts for the spectrum of abnormalities in the polycystic ovary syndrome. Different changes in hormonal, metabolism and the inflammatory markers as squealy of PCOS with adverse effect on the women life. OBJECTIVE: To study the relationship between polycystic ovary syndrome and levels of C-reactive protein, human interleukin and hormonal and metabolic alteration in women with PCOS PATIENTS AND METHODS: Thirty women with Polycystic Ovary syndrome (PCOS) and other thirty women without PCOS were included. Venous blood samples were taken in early follicular phase of menstrual cycle [day

... Show More
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Drug Delivery Technology
Association between some risk factors with hormonal state in a sample of infertile iraqi women
...Show More Authors

Scopus
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Obstetrics Gynecology And Cancer Research
Comparison of Levels of Activin A and Follistatin in Ectopic Pregnancies and Missed Abortions Patients
...Show More Authors

Scopus
Publication Date
Sun Jan 01 2017
Journal Name
Dissertation/thesis
A Model To Evaluate the Online Training for Global Virtual Teams in Global Software Projects
...Show More Authors

Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
A theoretical enhancement of electronic transfer dynamics in the D35CPDT dye donor to 𝑻𝒊𝑶𝟐 acceptor
...Show More Authors

View Publication
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (12)
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
2018 Computing In Cardiology Conference (cinc)
Theoretical and Experimental Reflection Coefficients in Flexible Tubes as a Function of the Mach Number
...Show More Authors

The standard formulation of Wave Intensity Analysis (WIA) assumes that the flow velocity (U) in the conduit is <;<; the velocity of propagation of waves (c) in the system, and Mach number, M=U/c, is negligible. However, in the large conduit arteries, U is relatively high due to ventricular contraction and c is relatively low due to the large compliance; thus M is > 0, and may not be ignored. Therefore, the aim of this study is to identify experimentally the relationship between M and the reflection coefficient in vitro. Combinations of flexible tubes, of 2 m in length with isotropic and uniform circular cross sectional area along their longitudinal axes, were used to present mother and daughter tubes to produce a range of reflection coeffic

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref