Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
هدف البحث الى إعداد تمرينات تعليمية بأسلوب التمرين المتغير واثره في تعلم مراحل فعالية الوثب العالي, واستخدمت الباحثون المنهج التجريبي على عينة من (20) طالبة في المرحلة الرابعة جامعة بغداد كلية التربية البدنية وعلوم الرياضة للبنات شعبة ( ب), مقسمين الى مجموعتين تجريبية وضابطة , واستخدم الباحثون منهج تعليمي بأسلوب التمرين المتغير للمجموعة التجريبية لمدة (6 أسابيع) بواقع وحدتين تعليمية في الأسبوع , واستنتجت
... Show MoreThis research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth
... Show MoreThe present paper, practical methods of professional translation, discusses the most important methods to achieve an accurate effective translation from the source language text to the equivalent target language text.
The present study suggests that practical translation like any literary activity is of six main stages that follow sequential order to achieve an accurate translation: (choosing the foreign text to be translated, the author of the text permission, the text translation, considering the title contextual meaning, reviewing the text translation, and finally finding a good publisher).
چکیده
پژوهش حاضر که با عنوان گامهای عملی یک ترجمهء حر
... Show MorePurpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreThe research aimed to identify the level of job security, the level of sports institutional performance, and the relationship, contribution and impact of job security to sports institutional performance from the point of view of workers in the Iraqi Ministry of Youth and Sports. The descriptive approach was adopted in the manner of correlational relationships on a sample of (400) individuals who were randomly selected by (33.333%) of the employees working in the institutions at the headquarters of the Ministry of Youth and Sports, amounting to a total of (2293) individuals for the sports season (2022-2023), and they are naturally distributed among (13) main institutions in the formations of the headquarters of this ministry, and after adopt
... Show MoreDue to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info
... Show MoreAbstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same
ABSTRACT
Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-
... Show MoreBiological activity of the carotenoids which are produced fromchemically-mutaed local isolate of Rhodotorula mucilaginosawas studied. The results showed variation of inhibition activity of caritenoids against different types of pathogenic bacteria include, Staph aureus, E. coli, B. subtilis and Salmo. typh., the number declined from 2×107cell/ml to 2×104, 5×104, 2×105, 9×105 cell/ml respectively after 24hour. The produced carotenoids from alocal mutant Rhodotorula mucilaginosa revealed an antioxidant activity as free radical removal of 85.6%. Carotinoides revealed a highest stability in petroleum ether solvent for 30 days at room temperature. It found that the pigment was more stability in sesame oil compared with sun flower and coc
... Show More