Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Al-kindy College Medical Journal
Comparison between Quantitative Computed Tomography and Dual-Energy X-Ray Absorptiometry in the Detection of Osteoporosis in Postmenopausal Women
...Show More Authors

Background: Osteoporosis is denoted by low bone mass and microarchitectural breakdown of bone tissue, directing to increased fracture risk and bone fragility. Fractures may lead to a decreased quality of life and increased medical costs. Thus, osteoporosis is widely considered a significant health concern.

Objective. This study aimed to compare quantitative computed tomography (QCT) and dual-energy X-Ray absorptiometry (DXA) to detect osteoporosis in postmenopausal women.

Subjects and Methods. We measured spinal volumetric bone mineral density (BMD) with QCT and areal spinal and hip BMD with DXA in 164 postmenopausal women. We calculated the osteo

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 07 2014
Journal Name
Baghdad Science Journal
Detection of RAF fusion transcripts in FFPE samples of Medullablastoma and Ependymom in Iraqi children with RT-RQPCR assays
...Show More Authors

Medulloblastomas and ependymomas are the most common malignant brain tumors in children. However genetic abnormalities associated with their development and prognosis remain unclear. Recently two gene fusions, KIAA1549–BRAF and SRGAP3–RAF1 have been detected in a number of brain tumours. We report here our development and validation of RT-RQPCR assays to detect various isoforms of these two fusion genes in formalin fixed paraffin embedded (FFPE) tissues of medulloblastoma and ependymoma. We examined these fusion genes in 44 paediatric brain tumours, 33 medulloblastomas and 11 ependymomas. We detected both fusion transcripts in 8/33, 5/33 SRGAP3 ex10/RAF1 ex10, and 3/33 KIAA1549 ex16/BRAF ex9, meduloblastomas but none in the 11 ep

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 16 2019
Journal Name
Proceedings Of The 2019 5th International Conference On Computer And Technology Applications
Four Char DNA Encoding for Anomaly Intrusion Detection System
...Show More Authors

Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Simplified Novel Approach for Accurate Employee Churn Categorization using MCDM, De-Pareto Principle Approach, and Machine Learning
...Show More Authors

Churning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date.  A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Journal Of Alloys And Compounds
A holistic approach to optical characterizations of vacuum deposited Cu2ZnSnS4 thin film coatings for solar absorbing layers
...Show More Authors

View Publication
Scopus (10)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Jun 23 2025
Journal Name
Islamic Communication Journal
Negotiating the meaning of female genital mutilation and cutting: A symbolic interactionist approach among religious university students
...Show More Authors

The meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women.  However, they are also willing, if

... Show More
View Publication
Crossref
Publication Date
Mon May 01 2017
Journal Name
Desalination And Water Treatment
Cadmium removal from simulated chloride wastewater using a novel flow-by fixed bed electrochemical reactor: Taguchi approach
...Show More Authors

View Publication
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Apr 14 2021
Journal Name
Wireless Personal Communications
A Partial CSI Estimation Approach for Downlink FDD massive-MIMO System with Different Base Transceiver Station Topologies
...Show More Authors

Massive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
A morphological study and a new species registration of genus Xerophloea Germa, 1839 sp.nov. From sub-family Ledrinae Fairmai, 1855 of the leafhopper (Hemiptera: Cicadellidae) in Iraq
...Show More Authors

Scopus
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Detection and isolation of flavonoid and aromatic acid from Cynara scolymus different parts cultivated in iraq
...Show More Authors

The target of this study was to study the natural phytochemical components of the head (capsule) of Cynara scolymus cultivated in Iraq. The head (capsule) of plant was extracted by maceration in70% ethanol for 72 hours, and fractioned by hexane, chloroform and ethyl acetate. Preliminary qualitative phytochemical screening was performed on the ethyl acetate fraction for capsule was revealed the presence of flavonoid and aromatic acids. These were examined by (high -performance liquid chromatography) (HPLC diodarray), (high- performance thin-layer chromatography)(HPTLC).

Flavonoids were isolated by preparative layer chromatography and aromatic acid was isolated by preparative high-

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref