Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The research aims to shed light on the internet and how to employ them and to take advantage of applications in scientific research among faculty members, from a survey the opinions of professors at the University of Alanbar and Almustansiriah, to see the reality of use of the Internet and ways to invest in the service of scientific research.
The follow descriptive analysis approach , which is appropriate to the nature of this study concerned with exploring the views on the uses of the Internet. The study reached the field the following results:
1- There are(60) % of respondents use the Internet on an ongoing basis to see new information and keep pace with scientific developments in the field of specialty and the average use of the
Abstract
The aim of the research is to introduce the international standards of the Supreme audit Institutions, as well as the role of these standards in achieving administrative reform and improving the performance of the Supreme audit Institutions and the performance of the economic units under its control.
In order to achieve the objectives of the research, a questionnaire was designed from two main axes that included a number of questions addressed to a number of officials and employees of the Supreme Audit Institutions and its affiliated bodies on the role of applying the international standards of the Supreme Audit Institutions in achieving administrative re
... Show MoreThis research is aiming to analyze the impacts of the current budget in Iraq by using the Government Finance Statistics Manual (GFSM) , the research is based on hypothesis: (There is an impact on the using of the Government Finance Statistics Manual (GFSM) In public budget in Iraq) .This hypothesis was demonstrated by using the questionnaire, a number of conclusions were reached, the most important being the lack of terminology adopted in the government accounting system and the Iraqi financial and accounting manual as a result of their adoption of the monetary basis for the lack of accounting terminology that meets t
... Show MoreAbstract :
The Aims of this research is to describe the concept of risk, its type and method of measurement, and to clarify the impact of these risks on the expected cash flow statement and the preparation of the target cash flow statement that takes these risks into consideration. Because the local economic environment is exposed to many risks, Therefore, this list will be predictive, which will help the economic unit to make administrative decisions, especially decisions related to operational, investment and financing activities. Therefore, the research problem is based on the fact that most of the local economic units are the list of flows According to the actual basis and not according to the discretionary basis (bud
... Show MoreThe research studies the main variables for the concept of sharing in knowledge in one of the most important control agencies in Iraq, which is (The Federal Board of Supreme Audit). Also, the quality of the controlling businesses by the Board in light of the major challenges that facing the fight against signs of cheating and administrative and financial corruption for offices submitted to controlled and auditing, with the increasing and intensification of these appearances. In order to enable the Board to cope with this situation, has to be thinking hard about how to achieve excellence, progress and development to face these situations, through the application of sharing in knowledge for the financial controller, and then achiev
... Show MoreThe book "News of Time in the History of Bani Abbas" for Khazraji of important historical books, because of the news of the sons of Abbas, which is part of the book (Alosdp Almstok in the history of Islam, the layers of kings, ranked on the years starting from the emergence of Islam
The current problem is summarized in what is called the development failing experience
in comprehencing the studying materials , so the students will feel worry of repeating failure
in he future , so he would seek blind keeping on heart for the studying material bond this isbad due to the forgetting in the future , one side of thesis research problem is that there is
many contradictory researches result in relation to the learning styles which impose the
nessicity to find results lessen this contradiction . the importance of the research is
summarized in the importance of the subject under the study , in that the researcher ( as in
her knowledge ) did not find a thesrs tackling the subject of the distinguished students
Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreThe rapid development of information technology and its use in all areas has had a positive impact on all areas, and financial markets have had a share of this development through the use of an electronic trading system to settle transactions, enhance transparency and disclosure in all activities of these markets and revitalize their performance.
The reason for choosing this topic is that it is a very important topic for what modern technology addresses in trading operations in financial markets. It is worth noting that these innovations have eliminated the need for direct contact with people, but through the Internet and telephone networks, and the new technology has reduced the costs of building systems
... Show More