Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
A New Approach for Developing Spectrophotometric Determination of Phenylephrine Drug in Pure, Pharmaceutics and Serum Samples Using Sodium Periodate as Oxidizing Agent via a Green Method of CFIA/Merging Zone Technique

     The research involved a rapid, automated and highly accurate developed CFIA/MZ technique for estimation of phenylephrine hydrochloride (PHE) in pure, dosage forms and biological sample. This method is based on oxidative coupling reaction of 2,4-dinitrophenylhydrazine (DNPH) with PHE in existence of sodium periodate as oxidizing agent in alkaline medium to form a red colored product at ʎmax )520 nm (. A flow rate of 4.3 mL.min-1 using distilled water as a carrier, the method of FIA proved to be as a sensitive and economic analytical tool for estimation of PHE.

Within the concentration range of 5-300 μg.mL-1, a calibration curve was rectilinear, where the detection limit was 3.252 μg.mL

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat May 08 2021
Journal Name
Iraqi Journal Of Science
Automated Deception Detection Systems, a Review

Humans use deception daily since it can significantly affect their life and provide a getaway solution for any undesired situation. Deception is either related to low-stakes (e.g. innocuous) or high-stakes (e.g. with harmful situations). Deception investigation importance has increased, and it became a critical issue over the years with the increase of security levels around the globe. Technology has made remarkable achievements in many human life fields, including deception detection. Automated deception detection systems (DDSs) are widely used in different fields, especially for security purposes. The DDS is comprised of multiple stages, each of which should be built/trained to perform intelligently so that the whole system can give th

... Show More
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Research In Social Sciences & Humanities
HRM Management Approaches, With a Focus on Employee Centric Approach: A Case Study In The Rafidain Bank In Iraq

This research attempts to shed light on a topic that is considered one of the most important topics of HRMs management, which is the Employee centric approach by examining its philosophy and understanding . To achieve the goal, the research relied on the philosophical analytical method, which is one of the approaches used in theoretical studies. The research reached a set of conclusions, the most important of which are the theoretical studies that addressed this entry in the English language and the lack of it in the Arabic language, according to the researcher's knowledge. The research reached a set of recommendations, the most important of which was that this approach needs more research, analysis and study at the practical and th

... Show More
Crossref
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Solution of Riccati matrix differential equation using new approach of variational ‎iteration method

To obtain the approximate solution to Riccati matrix differential equations, a new variational iteration approach was ‎proposed, which is suggested to improve the accuracy and increase the convergence rate of the approximate solutons to the ‎exact solution. This technique was found to give very accurate results in a few number of iterations. In this paper, the ‎modified approaches were derived to give modified solutions of proposed and used and the convergence analysis to the exact ‎solution of the derived sequence of approximate solutions is also stated and proved. Two examples were also solved, which ‎shows the reliability and applicability of the proposed approach. ‎

Publication Date
Tue Apr 24 2018
Journal Name
Journal Of The American Geriatrics Society
A Systems Approach to Identify Factors Influencing Adverse Drug Events in Nursing Homes

The objectives of the study were to identify the incidence rate and characteristics of adverse drug events (ADEs) in nursing homes (NHs) using the ADE trigger tool and to evaluate the relationships between resident and facility work system factors and incidence of ADEs using the System Engineering Initiative for Patient Safety (SEIPS) model. The study used 2 observational quantitative methods, retrospective resident chart extraction, and surveys. The participating staff included Directors of nursing, registered nurses, certified nurse assistants (CNAs). Data were collected from fall 2016 to spring 2017 from 11 NHs in 9 cities in Iowa. Binary logistic regression with generalized estimated equations was used to measure the association

... Show More
Scopus (24)
Crossref (27)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
Scopus (3)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Oct 29 2022
Journal Name
Computers
Intelligent Robotic Welding Based on a Computer Vision Technology Approach

Robots have become an essential part of modern industries in welding departments to increase the accuracy and rate of production. The intelligent detection of welding line edges to start the weld in a proper position is very important. This work introduces a new approach using image processing to detect welding lines by tracking the edges of plates according to the required speed by three degrees of a freedom robotic arm. The two different algorithms achieved in the developed approach are the edge detection and top-hat transformation. An adaptive neuro-fuzzy inference system ANFIS was used to choose the best forward and inverse kinematics of the robot. MIG welding at the end-effector was applied as a tool in this system, and the wel

... Show More
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
A New Approach for the Turbidimetric Determination of Hydronium ion by Using Homemade Linear Array Ayah 5SX1-T-1D-CFI Analyser

A new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
A New Approach for the Turbidimetric Determination of Hydronium ion by Using Homemade Linear Array Ayah 5SX1-T-1D-CFI Analyser

A new Turbidimetric method characterized by simplicity, accuracy and speed for determination of Hydronium ion by continuous flow injection analysis. The method was based on the formation of complex Zn3[Fe(CN)6] for Zinc(II) that was eluted by Hydronium ion from cation exchanger column with Potassium hexacyanoferrate(III) for the formation of a pale yellow precipitate and this precipitate was determined using homemade Linear Array Ayah-5SX1-T-1D continuous flow injection analyser. The optimum parameters were 2.7 mL.min-1 flow rate using H2O as a carrier stream, 1.7 mL.min-1 reagent stream, 110 L sample volume and open valve for the purge of the sample segment. Data treatment shows that linear range 0.01-0.1 mol.L-1 for each acids (HClO

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
Face mask detection methods and techniques: A review

Corona virus sickness has become a big public health issue in 2019. Because of its contact-transparent characteristics, it is rapidly spreading. The use of a face mask is among the most efficient methods for preventing the transmission of the Covid-19 virus. Wearing the face mask alone can cut the chance of catching the virus by over 70\%. Consequently, World Health Organization (WHO) advised wearing masks in crowded places as precautionary measures. Because of the incorrect use of facial masks, illnesses have spread rapidly in some locations. To solve this challenge, we needed a reliable mask monitoring system. Numerous government entities are attempting to make wearing a face mask mandatory; this process can be facilitated by using face m

... Show More
View Publication