Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
كاریگەری ستراتیژییەتی بەستن و ڕاكێشان لەسەر دەسكەوتی فێرخوازانی پۆلی هەشتەمی بنەڕەتی له بابەتی زمان و ئەدەبی كوردیدا/ اثر استراتيجية الشد والجذب في تحصيل طلاب الصف الثامن الاساسي في مادة اللغة والادب
...Show More Authors

Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Journal Of The College Of Languages (jcl)
Religious Discourse of Biblical Intertextuality in Abraham Regelson Works: Selected Samples from the Collection "House of Brightness": הנאום הדתי של האינטרטקסטואליות התנ''כית ביצירותיו של אברהם רגלסון סיפורים נבחרים מקובץ "בית הניצוץ"
...Show More Authors

This research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Baghdad Science Journal
Symmetric- Based Steganography Technique Using Spiral-Searching Method for HSV Color Images
...Show More Authors

Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 29 2019
Journal Name
Iraqi Journal Of Science
Intelligent TRIPLE DES with N Round Based on Genetic Algorithm
...Show More Authors

     This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or  broken to  crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
EFFECT OF ANIMAL FEED SUPPLEMENTATION WITH DIFFERENT CONCENTRATIONS OF FENUGREEK SEEDS (Trigonellafoenumgraecum) ON ANIMAL PRODUCTION AND MICROBIAL CHICKEN MEAT.: EFFECT OF ANIMAL FEED SUPPLEMENTATION WITH DIFFERENT CONCENTRATIONS OF FENUGREEK SEEDS (Trigonellafoenumgraecum) ON ANIMAL PRODUCTION AND MICROBIAL CHICKEN MEAT.
...Show More Authors

This study was conducted in the poultry field of Al-Mustansiriya University/ Baghdad, to show the effect of adding different levels 0, 1, 5 and 10% of the fenugreek seeds in the rations containing many contaminated microbes on the productive performance of broilers. 150-day-old rose meat was used with a 41 average weight (gm), were randomly allocated to 4 treatments with 3 replicates, and for each treatment 15 chicks per repetition: 0, 1, 5, and 10% (T0-T3), respectively. The results of this study showed that fenugreek seeds contain good amounts of protein, fat, ash and carbohydrates, which are 24.92, 8.82, 3.08 and 54.28 respectively. Fenugreek seeds also have high levels of tannins, coumarins and flavones, followed by saponins,

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The impact of moving the educational activities in the conservation of literary texts and the development of literary taste in the fifth grade students moral: The impact of moving the educational activities in the conservation of literary texts and the development of literary taste in the fifth grade students moral
...Show More Authors

Abstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Impact of Strategy 3-2-1 in acquiring Concepts of Sociology of fourth grade students: The Impact of Strategy 3-2-1 in acquiring Concepts of Sociology of fourth grade students
...Show More Authors

 

Abstract

The current research aims to identify the impact of triangular bridging strategy in the acquisition of sociology of fourth-stage students. To achieve the research objective, the following null hypotheses were adopted: there are no statistically significant differences at a significance level (0, 05) between the average grades of the experimental group students who studied the triangular bridging strategy in acquiring concepts of sociology and average grades of the control group. The researcher has selected the fourth-stage students from Alexandronah School for girls that s related to the Directorate General of Baghdad the sample consisted of (87) students at litera

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
BIOLOGICAL ACTIVITY OF THE CAROTENOIDS WHICH ARE PRODUCED FROM LOCAL ISOLATE Rhodotorula mucilaginosa AND DETRERMINATION THE CONDITIONS AFFECTING THEIR STABILITY: BIOLOGICAL ACTIVITY OF THE CAROTENOIDS WHICH ARE PRODUCED FROM LOCAL ISOLATE Rhodotorula mucilaginosa AND DETRERMINATION THE CONDITIONS AFFECTING THEIR STABILITY
...Show More Authors

Biological activity of the carotenoids which are produced fromchemically-mutaed local isolate of Rhodotorula mucilaginosawas studied. The results showed variation of inhibition activity of caritenoids against different types of pathogenic bacteria include, Staph aureus, E. coli, B. subtilis and Salmo. typh., the number declined from 2×107cell/ml to 2×104, 5×104, 2×105, 9×105 cell/ml respectively after 24hour. The produced carotenoids from alocal mutant Rhodotorula mucilaginosa revealed an antioxidant activity as free radical removal of 85.6%. Carotinoides revealed a highest stability in petroleum ether solvent for 30 days at room temperature. It found that the pigment was more stability in sesame oil compared with sun flower and coc

... Show More
View Publication Preview PDF