Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Performance Evaluation of Al-Karkh Water Treatment Plant Using Model-driven and Data-Driven Models
...Show More Authors
Abstract<p>There is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate Complete the Survival Function for Real Data of Lung Cancer Patients
...Show More Authors

 In this paper, we estimate the survival function for the patients of lung cancer using different nonparametric estimation methods depending on sample from complete real data which describe the duration of survivor for patients who suffer from the lung cancer based on diagnosis of disease or the enter of patients in a hospital for period of two years (starting with 2012 to the end of 2013). Comparisons between the mentioned estimation methods has been performed using statistical indicator mean squares error, concluding that the survival function for the lung cancer by using shrinkage method is the best

View Publication Preview PDF
Publication Date
Mon Jul 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Continuous Classical Optimal Control Problems for Triple Nonlinear Elliptic Boundary Value Problem
...Show More Authors

     In this research, our aim is to study the optimal control problem (OCP) for triple nonlinear elliptic boundary value problem (TNLEBVP). The Mint-Browder theorem is used to prove the existence and uniqueness theorem of the solution of the state vector for fixed control vector. The existence theorem for the triple continuous classical optimal control vector (TCCOCV) related to the TNLEBVP is also proved. After studying the existence of a unique solution for the triple adjoint equations (TAEqs) related to the triple of the state equations, we derive The Fréchet derivative (FD) of the cost function using Hamiltonian function. Then the theorems of necessity conditions and the sufficient condition for optimality of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
An excerpt on the analysis of correlate constructions: Exkurs zur Analyse der Korrelatkonstruktionen
...Show More Authors

The main idea that led me to write such research paper within the framework of Germanic linguistics is that I have not found any topic dealing with the term correlate in the German language, except in several articles in linguistic journals as well as one topic in a book describing the use of such a linguistic phenomenon in the language system. The research initially deals with the definition of the correlate at the level of the German language system. Correlate is unity describes specific relation of two sentences and identifies denoted constructs. Correlate is called a placeholder at the syntactic level because it does not occupy its original topological fields in the syntactic structure. The correlate (es) or the prepositiona

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Physics: Conference Series
An investigation into the implications of partial substitution of selenium with lead on the thermal properties for S<sub>60</sub>Se<sub>40-X</sub>Pb<sub>X</sub> Chalcogenide Compound
...Show More Authors
Abstract<p>This study includes the manufacture of four ternary alloys represented S<sub>60</sub>Se<sub>40-X</sub>Pb<sub>X</sub> with weight ratios x = 0, 10, 20, and 30 by the melting point method. The components of each alloy were mixed separately, then placed in quartz ampoules and vacuumed out with a vacuum of roger that 10<sup>−4</sup> Torr. The ampule was heated in two stages to avoid sudden dissipation and precipitation of selenium on the inner mass of the quartz tube. The ampoule was gradually heated and kept at 450°C for approximately 4 hours followed by 950°C for 10 hours.at a rate of 10 degrees Celsius, the temperature of the electric furnace</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
Fibrewise slightly topological spaces
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Al-nahrain Journal Of Science (anjs)
Fibrewise Pairwise Bi-Topological Spaces
...Show More Authors

The main idea of this research is to consider fibrewise pairwise versions of the more important separation axioms of ordinary bitopology named fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise - spaces, fibrewise pairwise -Hausdorff spaces, fibrewise pairwise functionally -Hausdorff spaces, fibrewise pairwise -regular spaces, fibrewise pairwise completely -regular spaces, fibrewise pairwise -normal spaces and fibrewise pairwise functionally -normal spaces. In addition we offer some results concerning it.

Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation of health and safety management systemAccording to international standards OHSAS 18001: 2007A case study at Al-Mamoun Factory / General Company for vegetable oil industry
...Show More Authors

This research aims to knowledge of the scope of applying the international specification of which is regarded to occupational health and safety management system (OHSAS 18001) second edition for year 2007 by The AL-Mammon Factory / The General Company For Vegetable Oils Industry in order to diagnosis the gap between specification requirements and reality by using the checklist made based upon the items of the specification, after translating the English copy into Arabic. The results of the research and analysis that occupational health and safety management system in comparison to the specification requirements in all of its main items, which was (%22.26) applied and documented partly, this refer to the existence of great gap (%7

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 03 2023
Journal Name
Al-mansour Journal
SOME CLASSAS OF FULL STABLITY BANACH ALGEBRA MODULES
...Show More Authors

The research is an article that teaches some classes of fully stable Banach - Å modules. By using Unital algebra studies the properties and characterizations of all classes of fully stable Banach - Å modules. All the results are existing, and they've been listed to complete the requested information.

Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Comparison between Ghassan Kanafani's Novel " Ma tabaqa lakom" and William Faulkner's "The Sound and the Fury" from the Perspective of the American School (the methodology of the novelistic theme and style): مقایسة دو رمان "ماتبقّي لكم"کنفانی و " خشم و هياهو"ی فاکنر بر اساس مكتب آمريكا (بررسی روش شناختی محتوایی و سبکی )
...Show More Authors

     Being the meeting points of the world different languages and out of a scholarly perspective, comparative literature represents a cultural leap as well as an artistic and intellectual development or a global literary movement of both prose and poetry. Such homogenous literary structure requires a systematic and coherent study of the literary output of the people different cultures and civilizations. It also represents the theoretical approach of the present study that debates a systematic comparison between Ghassan Kanafani’s All That's Left to You and William Faulkner’s. The Sound and the Fury.  Within the perspective of the descriptive analysis approach, the present paper discusses th

... Show More
View Publication Preview PDF
Crossref