Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Scientific Visualization
Shadow Detection and Elimination for Robot and Machine Vision Applications
...Show More Authors

Shadow removal is crucial for robot and machine vision as the accuracy of object detection is greatly influenced by the uncertainty and ambiguity of the visual scene. In this paper, we introduce a new algorithm for shadow detection and removal based on different shapes, orientations, and spatial extents of Gaussian equations. Here, the contrast information of the visual scene is utilized for shadow detection and removal through five consecutive processing stages. In the first stage, contrast filtering is performed to obtain the contrast information of the image. The second stage involves a normalization process that suppresses noise and generates a balanced intensity at a specific position compared to the neighboring intensit

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 05 2025
Journal Name
2025 Ieee 4th International Conference On Computing And Machine Intelligence (icmi)
From Pixels to Diagnosis: AI-Powered CNN for Pneumonia Detection
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (19)
Crossref (11)
Scopus Crossref
Publication Date
Sat Oct 25 2025
Journal Name
Iet Networks
An Effective Technique of Zero‐Day Attack Detection in the Internet of Things Network Based on the Conventional Spike Neural Network Learning Method
...Show More Authors
ABSTRACT<p>The fast evolution of cyberattacks in the Internet of Things (IoT) area, presents new security challenges concerning Zero Day (ZD) attacks, due to the growth of both numbers and the diversity of new cyberattacks. Furthermore, Intrusion Detection System (IDSs) relying on a dataset of historical or signature‐based datasets often perform poorly in ZD detection. A new technique for detecting zero‐day (ZD) attacks in IoT‐based Conventional Spiking Neural Networks (CSNN), termed ZD‐CSNN, is proposed. The model comprises three key levels: (1) Data Pre‐processing, in this level a thorough cleaning process is applied to the CIC IoT Dataset 2023, which contains both malicious and t</p> ... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Analytical Methods
Determination of pharmaceuticals in freshwater sediments using ultrasonic-assisted extraction with SPE clean-up and HPLC-DAD or LC-ESI-MS/MS detection
...Show More Authors

A robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.

View Publication
Scopus (26)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Artificial Intelligence For Covid-19
An Efficient Mixture of Deep and Machine Learning Models for COVID-19 and Tuberculosis Detection Using X-Ray Images in Resource Limited Settings
...Show More Authors

View Publication
Scopus (35)
Crossref (27)
Scopus Crossref
Publication Date
Sat Sep 03 2022
Journal Name
International Journal Of Health Sciences
Using Elisa and nested PCR for detection of the toxoplasmosis in milk and the influence of infection and some factors on milk composition in the Iraqi local and Shami goats
...Show More Authors

This study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Using the Balanced Performance Approach to Increase the Effectiveness of Strategic Planning in order to Maximize the Job Satisfaction Rates at the Faculties of Bisha University
...Show More Authors

Purpose: To use the balanced measurement approach as a strategic link for increasing the effectiveness of strategic planning in the direction of achieving satisfaction rates at Bisha University in Saudi Arabia

Design / methodology / approach –The questionnaire survey was used to collect the data of the study from the faculty members at University of Bisha.

Findings –Prove the assumption that the use of the balanced measurement approach - as a strategic planning tool - leads to maximize the satisfaction rates among faculty members at the University of Bisha.

Research limitations/implications-  adopt effective strategic planning in order to achieve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
Optimizing the MPLS support for real time IPv6-Flows using MPLS-PHS approach
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
To Domesticate or to Foreignize: An Approach to Translating Fables and Fairy Tales
...Show More Authors

      The present study deals with the strategies used in the Arabic translations of the most popular genres of children’s literature; namely fairy tales and fables as an attempt to identify the best methods and strategies to be adopted in translating these genres to fulfill the ultimate purpose of enriching the children’s knowledge in addition to attracting their interest and arousing the joy sought for in every piece of literature.

The study sets off from three dominating trends: the first calls for the adoption of domestication strategy of translation as the most appropriate and effective strategy in translation for children. In the same line, the second opposes using the foreignization strategy, w

... Show More
View Publication Preview PDF
Crossref