Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The problem of research is the need to find out the obstacles and difficulties facing women in accessing leadership positions at the University of Baghdad from their point of view. The importance of research comes from the importance of women in the university and their vital role in the development of society. The research objectives summarized the most important obstacles facing women Access to the leadership positions in the university and the relative weight of these obstacles as well as trying to identify differences in their view of these obstacles according to the variables of specialization (scientific, human) and the scientific title (Professor, Assistant Professor, Teacher, Assistant Lecturer). They were (144) university female
... Show MoreIn this paper, we proved coincidence points theorems for two pairs mappings which are defined on nonempty subset in metric spaces by using condition (1.1). As application, we established a unique common fixed points theorems for these mappings by using the concept weakly compatible (R-weakly commuting) between these mappings.
The researcher aims at focusing on the participations of children journalism in supplying the educational values for them. The researcher uses the survey method in addition to the method of content analysis through analyzing the content of two journals (Majalati and The Mezmar). Both of them deal with children issues.
The researcher concludes that the two journals focus on literary arts in a way which surpasses the journalistic arts. Furthermore, the two journals have concerned with showing the positive values as well as insuring the necessity of rectifying the wrong behaviors. Finally, the researcher recommends that it is necessary to improve the employees who work with children j
... Show MoreThe ration card system is a kind of support provided by the state to individuals through the provision of essential goods at subsidized prices during the period of war or crisis. For many years, the ration card was an essential source of food supplies to Iraqis, especially under the economic siege of the nineties, But after the events of 2003 and the passage of Iraq's political and economic changes required radical reforms in the ration card system according to the recipes of the International Monetary Fund. It was evident from the estimation of the demand function that the price did not have the greatest impact on this type of goods because the ration card items are subsidized by the government. There is also a
... Show MoreThe main aim of this research is to: 1) identify the Transformational Leadership of the Managers of higher School in ALkut district and its relationship with organizational Loyalty. 2) Clarify the relationship between Transformational Leadership and organizational Loyalty. Regarding the research methodology, the researcher used the descriptive method because it meets this research. The two research tools were a questionnaire and the statistical program (spss). The results revealed that there is a strong positive relationship between Transformational Leadership and organizational Loyalty, which means that when the managers have a Transformational Leadership leads to having organizational loyalty.
The treasury bills one internal government debt instruments in iraq that were used to finance temporary deficits in the government budget, There fore the government resorted to issuing for the purpose of providing liquidity, As well as to invest in productive progects, After that it was financing the budget deficit by the monetary authovity of the central baalpennek [the new cash velease] which led to negative effects on the Iraqi econome, Thus we find that the treasury transfers have formed alarge proportion of the gross domestic government debt to finance the deficit ayear ago 2003. &nbs
... Show Moreخضعت المحاسبة الإدارية إلى هيمنة المحاسبة المالية عليها اثر ظهور القوائم المالية المدققة في بدايات القرن الماضي الناتجة من ظهور المنظمات المنظمة للمهنة وما رافق من إلزام الشركات بإعداد التقارير المالية من الحسابات المالية وفقاً للمبادئ المحاسبية المقبولة قبولاً عاماً والتي أثرت في قيمة المعلومات المقدمة من قبل المحاسبة الإدارية مما أدى إلى إن تصبح تلك المعلومات غير ملائمة للاستخدام الإداري وهو ما ا
... Show MoreThe Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods.
The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for
... Show MoreInternational trade in services is becoming increasingly important as it is an economic activity that deals with invisible trade, which has become increasingly important in the balance of international trade. The establishment of the WTO is a starting point in international trade relations. It is responsible for all aspects of international trade, , And in view of the continued increase in international trade in services, the need for more internationally recognized rules has become more urgent, especially as it has been increasingly proven that the traditional framework of public services is inadequate to operate some of the most dynamic and innovative sectors of the economy. (GATS) to be the regulatory framework for this sector
... Show More