It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
The study aimed to establish the association of miR-153-3p expression with treatment response to IM in CML patients. Sixty CML patients were included and divided into two groups consistent with their response to treatment whether sensitive or resistant to IM. Ten healthy normal participants were enrolled as control group. RNA was extracted from serum to work out miR-153-3p expression utilizing real-time quantitative reverse transcription polymerase chain reaction. The primers were supplied by Macrogen Inc. Twenty seven patients were sensitive to imatinib and 33 were resistant to imatinib. The ratio of male to female was 1.14:1. The bulk (58%) of patients were within the age range of 41-60 years. Weight and gender did not significantly diffe
... Show MoreThe culture of the daily necessities of life of the individual in any society, whether advanced or simple, and the concept of multiple aspects of culture, including what is culture and education there holds that art is culture, and there are those who are classified according to human societies .. Some also go to it is not related to the study and learning .. And has been Iraq as a symbol of Arab culture, but they declined because of what passed by political crises and social in its modern history, and aims Current search to study culture psychological, political and social among the students of the university after the U.S. occupation of Iraq, the researcher prepared a questionnaire and after hold the appropriate statistical met
... Show MoreAlthough Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. M
... Show MoreThe deficiency in the nurse staff in the health organizations consider an important problem that must be studied and solved basically , not only because it affect on the health organization and it's strategic goals , but also it affect the human being and it's health which can't be substituted with anything or delayed in it's treatment ,This research aims to necessary for health organizations to strategically help in maintaining the nurse staff and to keep that in it's strategic orientation and it's mission , moreover , the health organizations must study the reality of the nurse in the health organizations and know the causes beyond leaving the nurse staff the nurse job , and then remove
... Show MoreThe investment portfolio of financial instruments & banking relatively new in the banking sector & the world of investment &capital markets in spite of its importance & its advantages in terms of the nature of the diversity of investment instruments as well as reduce the risk of investment & its contribution to the revitalization of the banks & the financial market , economic, &characterized by developments accelerated under information & communications technology , as is the portfolio tool vehicle of investment tools that provide for people who want to invest & they can not manag
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreAbstract
The aim of the current research is to extract the psychometric properties of Philip Carter's tests (for mental agility) according to the classical measurement theory. To achieve these goals, the researcher took a number of scientific steps to analyze Philip Carter's tests (for mental agility) according to the classical measurement theory. The researcher translated Philip Carter's (mental agility) tests from English into Arabic and then he translated them conversely. For the purpose of statistical analysis of paragraphs of the Philip Carter tests (mental agility) to extract the psychometric properties, the tests were applied to a sample of (1000) male and female students who were selected by cluster sampl
... Show More