Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Current search problem manifested and widows who community harsh to bear hardships and pains، The goals of continuing the sustainability of life and take responsibility, and especially in light of the difficult circumstances in which Iraq is going through, and the displacement of murder and terrorism, which generated huge numbers of widows and orphans Because of the loss of a breadwinner and which became women and children are the most harm to the victim and as a result of wars and armed tendencies So this research is an important and vital topic opens our horizons important for overlapping roles of women widows and their impact on the achievement and status of Iraqi women and that as long as aptly characterized and their ability to end
... Show MoreThis work studies the role of serum apelin-36 and Glutathione S-transferases (GST) activity in association with the hormonal, metabolic profiles and their link to the risk of cardiovascular disease (CVD) in healthy and patients' ladies with polycystic ovary syndrome (PCOS). A total of fifty-four (PCOS) patients and thirty-one healthy woman as a control have been studied. The PCOS patients were subdivided on the basis of body-mass-index (BMI), into 2-subgroups (the first group was obese-PCOS with BMI ≥ 30 and the second group was non-obese PCOS MBI<30). Fasting-insulin-levels and Lipid-profile, Homeostatic-model assessment-of-insulin-resistance (HOMA-IR), follicle-stimulating-hormone (FSH), luteinizing-hormone (LH), testosterone and
... Show MoreWhatever the designers of the advertisement in choosing the text and spoken phrases, those phrases cannot give or convey the full meaning to the recipient only if this spoken and written language is reinforced with another language based on the signals, movements, and symbols that are displayed using the body or other artistic elements of the advertisement such as pictures, colors, music, effects, and other elements used in the artistic construction of television advertising. All these artistic elements contribute to the completion of the advertising idea and make it ready to be displayed to the public.
Scientists and researchers, in the field of psychology, have relied a lot on this language (body language). And some of them put
... Show MoreBackground: Acute myocardial infarction (AMI) is one of the most common diagnoses in hospitalized patients. Increased plasma hemostatic markers were noted in acute myocardial infarction, indicating that the blood coagulation system is highly activated in those patients. Aims of the study: To study the level of intrinsic coagulation factors including (FVIII:C, FIX:C ,FXI:C ,FXII:C ) in patients with acute myocardial infarction. Type of the study: Cross –sectional study. Methods: Thirty patients (their age range is 48-68 years) were included in this study (9 female, 21 male) who were just admitted to the coronary care unit in AL-Yarmouk Teaching Hospital and diagnosed as having acute myocardial infarction patients, blood samples were tak
... Show MoreThe current study aims to overcome the conflicts facing the company in its way of staying and continuing to maintain its performance excellent in light of the intense competition, which made it seek to find strong ways and links with its customers through electronic communication using electronic platforms, and this put confidence and safety in The place of suspicion and fear of not fulfilling credibility or violating the privacy, so this research comes to answer about the question: “Can the company achieve an excellent performance by relying on the customer's electronic confidence?”.
The study followed the descriptive and analytical approaches by providing a virtual model and testing the zero hypotheses, which stipulat
... Show MoreThis research Sheds highlights the procedural protections that must be enjoyed by the consumer in the face of the product, which is the protection of no less dangerous than the substantive protection of our obligations and duties delivered by the legislature upon the product of consumer interest, what is the benefit of the right if the access road to him complicated, so know The consumer has a right to the face of the product, but leaves the claim, either to ignorance For access to this right either to the difficulty of connecting to him.
That this research modest attempt we tried through which to focus on the way to the consumer behavior of arrived right, as we tried to highlight the weaknesses and the complexity of the procedure to
Labor movement is considered important in Britain because it is an international phenomenon of the feudal system and one of the flowerings of the era of the capitalist machine. At the beginning of the 18th century, the world witnessed a change and progress in many aspects of the industrial fields such as the different means of production .this era is called the industrial revolution which especially appeared in Britain and extended to other areas of the world .it leads to many changes in Europe and participated in different economic, political and cultural and social fields. and it has a very important role in progress and development but its disadvantage is that it is exploited by the capitalists to achieve their special rights .in othe
... Show More