Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreRegarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct
... Show MoreBuckling analysis of a laminated composite thin plate with different boundary conditions subjected to in-plane uniform load are studied depending on classical laminated plate theory; analytically using (Rayleigh-Ritz method). Equation of motion of the plates was derived using the principle of virtual work and solved using modified Fourier displacement function that satisfies general edge conditions. The eigenvalue problem generated by using Ritz method, the set of linear algebraic equations can be solved using MATLAB for symmetric and anti-symmetric, cross and angle-ply laminated plate considering some design parameters such as aspect ratios, number of layers, lamination type and orthotropic ratio. The results obtained g
... Show MoreThe purpose of this research work is to synthesize conjugates of NSAIDs (ibuprofen, and naproxen) with sulfadiazine as possible mutual prodrugs to overcome the local gastric irritation of NSAIDs with free carboxyl group by formation of ester linkage that supposed to remain intact in stomach and may hydrolyze in intestine chemically or enzymatically; in addition to that attempting to target the synthesized derivative to the colon by formation of azo bond that undergo reduction only by colonic bacterial azoreductaze enzyme to liberate the parent compound to act locally (treatment of inflammation and infections in colon)
The aim of this study was to develop a sensor based on a carbon paste electrodes (CPEs) modified with used MIP for determination of organophosphorus pesticides (OPPs). The modified electrode exhibited a significantly increased sensitivity and selectivity of (OPPs). The MIP was prepared by thermo-polymerization method using N,N-diethylaminoethymethacrylate (NNDAA) as functional monomer, N,N-1,4-phenylenediacrylamide (NNPDA) as cross-linker, the acetonitrile used as solvent and (Opps) as the template molecule. The three OPPs (diazinon, quinalphos and chlorpyrifos) were chosen as the templates, which have been selected as base analytes which used widely in agriculture sector. The extraction efficiency of the imprinted polymers has been evaluat
... Show MoreThe use of blended cement in concrete provides economic, energy savings, and ecological benefits, and also provides. Improvement in the properties of materials incorporating blended cements. The major aim of this investigation is to develop blended cement technology using grinded local rocks . The research includes information on constituent materials, manufacturing processes and performance characteristics of blended cements made with replacement (10 and 20) % of grinded local rocks (limestone, quartzite and porcelinite) from cement. The main conclusion of this study was that all types of manufactured blended cement conformed to the specification according to ASTM C595-12 (chemical and physical requirements). The percentage of the compress
... Show MoreThe use of blended cement in concrete provides economic, energy savings, and ecological benefits, and also provides. Improvement in the properties of materials incorporating blended cements. The major aim of this investigation is to develop blended cement technology using grinded local rocks . The research includes information on constituent materials, manufacturing processes and performance characteristics of blended cements made with replacement (10 and 20) % of grinded local rocks (limestone, quartzite and porcelinite) from cement.
The main conclusion of this study was that all ty
... Show More