Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 20 2020
Journal Name
Remote Sensing
Lossy and Lossless Video Frame Compression: A Novel Approach for High-Temporal Video Data Analytics
...Show More Authors

The smart city concept has attracted high research attention in recent years within diverse application domains, such as crime suspect identification, border security, transportation, aerospace, and so on. Specific focus has been on increased automation using data driven approaches, while leveraging remote sensing and real-time streaming of heterogenous data from various resources, including unmanned aerial vehicles, surveillance cameras, and low-earth-orbit satellites. One of the core challenges in exploitation of such high temporal data streams, specifically videos, is the trade-off between the quality of video streaming and limited transmission bandwidth. An optimal compromise is needed between video quality and subsequently, rec

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
A Novel Approach to Improving Brain Image Classification Using Mutual Information-Accelerated Singular Value Decomposition
...Show More Authors

View Publication
Scopus (48)
Crossref (43)
Scopus Clarivate Crossref
Publication Date
Mon Jun 30 2025
Journal Name
Scripta Medica
Case Report: A Rare Presentation of Sigmoid Volvulus During Pregnancy With an Integrative Postoperative Approach
...Show More Authors

View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
International Journal On Interactive Design And Manufacturing (ijidem)
A real-time automated sorting of robotic vision system based on the interactive design approach
...Show More Authors

View Publication
Scopus (41)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Artificial Intelligent Models for Detection and Prediction of Lost Circulation Events: A Review
...Show More Authors

Lost circulation or losses in drilling fluid is one of the most important problems in the oil and gas industry, and it appeared at the beginning of this industry, which caused many problems during the drilling process, which may lead to closing the well and stopping the drilling process. The drilling muds are relatively expensive, especially the muds that contain oil-based mud or that contain special additives, so it is not economically beneficial to waste and lose these muds. The treatment of drilling fluid losses is also somewhat expensive as a result of the wasted time that it caused, as well as the high cost of materials used in the treatment such as heavy materials, cement, and others. The best way to deal with drilling fluid losses

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Minar International Journal Of Applied Sciences And Technology
NEW RECORD SPECIES OF GENUS ASTRAGALUS L. IN IRAQ
...Show More Authors

Astragalus mesogitanus is a new recorded species for Iraqi flora, from Onobrychium genus section, was collected from Erbil district, all morphological features were described in details as well as some micromorphological character as the trichomes and were provided with dimensions and plates, section key was also updated which illustrated the importance of standard (corolla) trichomes in species identification. Keywords: Astragalus, Fabaceae, Iraq, New record, Onobrychium, Trichomes.

View Publication
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
New Types of Pseudo Ideals in Pseudo Q-algebra
...Show More Authors

In this paper, we introduce the notions of Complete Pseudo Ideal, K-pseudo Ideal, Complete K-pseudo Ideal in pseudo Q-algebra. Also, we give some theorems and relationships among them are debated.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed May 15 2013
Journal Name
Iraqi Journal Of Science
New record species- from the family Euphorbiaceae in Iraq
...Show More Authors

Abstract The present work included morphological, anatomical, and palynological characters for the new species Acaalypha australis L. specimens, which belong to the family Euphorbiaceae. The species recorded in the study for the first time in Iraq. The plants of this species are annual herbs with green, striated or sub – polygonal stem, and branched near bases, Leaves are simple spirally alternate and lanceolate in shape. Flowers are unisexual, arranged in the axial of distinct leafy and cordate bracts, female flower arranged at the bracts bases and each flower with trileafed perianth and superior ovary with trilobed stylar stigma which has dense and coiled stigmatic hairs. Male flowers are arranged as a mixed verticellate inflorescence a

... Show More