Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Al-academy
Iconic Form in Modern Graphic Design: علي محمد شواي غدير
...Show More Authors

The graphic field invests the visual space then shows the shape by all means of expression that have a certain meaning. The research is interested in studying the iconic form in the modern graphic design through investing names and flags and the extent of their action in the social life and invest them from one to another looked at from viewpoint of trading and consumption and investing their wide popularity. The study problem is manifested in the following question:
1- Does the iconic form help in ad circulation?
The importance of the research lies in the following:
1- Reading the visual iconic form through deciphering its current symbols. The form combines a concept and a case or a form and meaning.

The theoretical fra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Morphological, Molecular and Pollen Grain Investigations of Salix Species in Egypt
...Show More Authors

Genus Salix is among family Salicaceae, distributing in the northern hemisphere. It is represented in Egypt by two species (Salix mucronata and Salix tetrasperma). The classification of Salix at the generic and infra-generic levels is still outstanding. We have agreed to list the Egyptian species of this genus. We collected them during field trips to most Egyptian habitats; fresh and herbarium specimens were subjected to taxonomic revision based on morphological characters; scanning electron microscope (SEM) for pollen grains; isozyme analysis using esterase and peroxidase enzymes and genetic diversity using random amplified polymorphic DNA (RAPD). We recorded that both sexes of S.

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2026
Journal Name
مجلة الاربعين المحكمة
أثر التحولات السياسية والحراك الشعبي في الزيارة الأربعينية: دراسة تاريخية
...Show More Authors

تهدف هذه الدراسة إلى استقصاء العلاقة الديناميكية بين التحولات السياسية والحراك الشعبي وتأثيرهما في تجسيد الزيارة الأربعينية في العراق، من خلال تحليل تطورها الرمزي وتفاعلها مع سياسات الحكومات العراقية المتعاقبة منذ تأسيسها عام 1921 وحتى مرحلة ما بعد 2003. تُفصل الدراسة كيفية تعامل السلطات العراقية المتعاقبة مع الزيارة الأربعينية، مع تسليط الضوء على اعتبار الزيارة منبراً للتعبير عن الحراك الشعبي والرفض للإجرا

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2012
Journal Name
Eastern Mediterranean Health Journal
Knowledge and practices of women in Iraqi universities on breast self examination
...Show More Authors

This study evaluated the knowledge and practice of breast self-examination (BSE), among a sample of educated Iraqi women. The study sample comprised 858 women aged 18–62 years affiliated to 6 major Iraqi universities, categorized according to occupation as teaching staff (11.5%), administrative staff (18.0%) and students (70.5%). Data were collected by a self-completed questionnaire. In all, 93.9% of the women had heard about BSE, the main source of information was television (39.9%), doctors (18.4%) and the awareness campaign of the Iraqi National Breast Cancer Research Programme (11.6%). Only 53.9% of the women practised BSE; the most common excuses by those that did not were lack of knowledge of the significance of BSE (42.0%) and lack

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Spectrophotometric and Spectrofluorimetric Determination of Terazosin in Tablets by Eosin Y
...Show More Authors

Simple, sensitive and accurate two methods were described for the determination of terazosin. The spectrophotometric method (A) is based on measuring the spectral absorption of the ion-pair complex formed between terazosin with eosin Y in the acetate buffer medium pH 3 at 545 nm. Method (B) is based on the quantitative quenching effect of terazosin on the native fluorescence of Eosin Y at the pH 3. The quenching of the fluorescence of Eosin Y was measured at 556 nm after excitation at 345 nm. The two methods obeyed Beer’s law over the concentration ranges of 0.1-8 and 0.05-7 µg/mL for method A and B respectively. Both methods succeeded in the determination of terazosin in its tablets

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
An Application of Non-additive Measures and Corresponding Integrals in Tourism Management
...Show More Authors

Non-additive measures and corresponding integrals originally have been introduced by Choquet in 1953 (1) and independently defined by Sugeno in 1974 (2) in order to extend the classical measure by replacing the additivity property to non-additive property. An important feature of non –additive measures and fuzzy integrals is that they can represent the importance of individual information sources and interactions among them. There are many applications of non-additive measures and fuzzy integrals such as image processing, multi-criteria decision making, information fusion, classification, and pattern recognition. This paper presents a mathematical model for discussing an application of non-additive measures and corresp

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu May 01 2025
Journal Name
مجلة دجلة
Higher Education and Sustainable Development in 2050: Reality and Future Challenges
...Show More Authors

Higher education is one of the foundational pillars that contributes to the development of societies and the achievement of social and economic progress. With the accelerating advancements in technological, environmental, and social fields, universities and educational institutions worldwide are facing significant challenges requiring them to adapt to these changes and develop new educational strategies. In this context, directing higher education towards achieving sustainable development goals (SDGs) has become imperative, as these goals are now an integral part of modern societies' vision, particularly in light of global challenges such as climate change, population growth, and unemployment. By the year 2050, educational institutions

... Show More
Preview PDF
Publication Date
Sat May 17 2025
Journal Name
سفير برس
استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية
...Show More Authors

تناول المقال موضوع استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية، وركز على توضيح أهمية هذا التكامل في تعزيز الأداء الأكاديمي والبحثي. استعرضت المقالة تعريفات كل من الذكاء الاصطناعي والبيانات الضخمة، وأنواع البيانات داخل المؤسسات العلمية، ثم بينت أبرز التطبيقات العملية مثل التنبؤ بأداء الطلبة، والإرشاد الذكي، وتحليل سلوك المستخدمين، والفهرسة التلقائية. كما ناقشت المقالة التحدي

... Show More
Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref