Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Computers And Electronics In Agriculture
Detection of charcoal rot (Macrophomina phaseolina) toxin effects in soybean (Glycine max) seedlings using hyperspectral spectroscopy
...Show More Authors

View Publication
Scopus (15)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Agriculture (pol'nohospodárstvo)
Molecular detection of ‘<i>Candidatus</i> Phytoplasma australasia’ and ‘<i>Ca.</i> P. cynodontis’ in Iraq
...Show More Authors
Abstract<p>The association of phytoplasma was investigated in symptomatic tomato (<italic>Solanum lycopersicum</italic> L.), eggplant (<italic>Solanum melongen</italic> L.), mallow (<italic>Malva</italic> spp.) and Bermuda grass (<italic>Cynodon dactylon</italic> L.) plants exhibiting witches’ broom and white leaf diseases, respectively. Total DNA was extracted from tomato (n=3), eggplant (n=2), mallow (n=2) and Bermuda grass (n=8) samples. Direct polymerase chain reaction (PCR) was performed using P1/P7 primer set, then PCR products were sequenced. Sequences obtained from tomato, eggplant and mallow shared 99% maximum nucleotide identity with phytoplasm</p> ... Show More
View Publication
Scopus (11)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Amultifaceted Review Journal In The Field Of Pharmacy
Zwitterionic ion chromatography coupled with ultraviolet detection for the quantification of 2-deoxyguanosine in human serum
...Show More Authors

Scopus (17)
Scopus
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Business Risk Assessment Using Client Strategy Analysis Approach in order to Increase the Efficiency and Effectiveness of the Audit Process
...Show More Authors

Abstract

This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Mar 18 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Description of A New Species of Leafhopper Genus Assuita Lindberg; 1969 (Hemoptera: Cicadellidae: Agalliinae) From Iraq
...Show More Authors

The present study introduces description of a new species of leafhopper of genus Assuita Lindberg; 1969. This study includes external morphological characters and the spotting patterns and photos of vertex face pronotum, mesonotum, fore wing, hind wing and the shape of male abdominal abodeme, also aedeagus, connective, genital style and genital plate.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Detection of human metapneumovirus RNA sequence in nasopharyngeal SWAP sample from children with acute respiratory tract infections in Najaf Province, Iraq
...Show More Authors

The purpose of this subject is to identify what is being studied in the article, which is the involvement of human Metapneumovirus in children with respiratory illnesses. During the period November 2020 to February 2021, 100 patients with respiratory tract infections were admitted to Al Zahra Teaching Hospital and AL-Forat AL-Awsat Teaching Hospital in Najaf Governorate. Nasopharyngeal swabs were collected from patients for molecular diagnosis of human metapneumovirus using Real-Time-PCR. The patients were distributed based on age into five groups as follows (Less than one, 1-2, 2-3, 3-4, and 4-5 years), and twenty samples of healthy individuals were approved as a control group without any clinical signs of infection. the children of age gr

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 27 2018
Journal Name
International Research Journal Of Pharmacy
PRELIMINARY PHYTOCHEMICAL SCREENIG AND HIGH PERFORMANCE THIN LAYER CHROMATOGRAPHY[HPTLC] DETECTION OF PHENOLIC ACIDS IN LANATA CAMARA LEAVES CULTIVATED IN IRAQ
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Change detection of remotely sensed image using NDVI subtractive and classification methods.
...Show More Authors

Change detection is a technology ascertaining the changes of
specific features within a certain time Interval. The use of remotely
sensed image to detect changes in land use and land cover is widely
preferred over other conventional survey techniques because this
method is very efficient for assessing the change or degrading trends
of a region. In this research two remotely sensed image of Baghdad
city gathered by landsat -7and landsat -8 ETM+ for two time period
2000 and 2014 have been used to detect the most important changes.
Registration and rectification the two original images are the first
preprocessing steps was applied in this paper. Change detection using
NDVI subtractive has been computed, subtrac

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (4)
Scopus