Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
This research display a selected sample of Regelson's texts, there were interrelations and interactions unfolded so as to show his creativity in the employment of religious texts. In the story "In the Youth of Moses", he inter-texted the episode of the Prophet Moses from the Torah, the Source of legislation, to signify a legislative issue needed by the community. As for the story of "Samson, One of the Falling", he originated the character of The Judge Samson by alluding to the Book of the Judges, which is the Book which reminded of the defeat and slavery of the Palestinians by a Jewish leader, as is related in Jewish religious texts. Further, and the story of "And Haman Said", he chose the story of the Queen Esther from the Book of Esth
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreThis work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.
is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines
... Show MoreThis study was conducted in the poultry field of Al-Mustansiriya University/ Baghdad, to show the effect of adding different levels 0, 1, 5 and 10% of the fenugreek seeds in the rations containing many contaminated microbes on the productive performance of broilers. 150-day-old rose meat was used with a 41 average weight (gm), were randomly allocated to 4 treatments with 3 replicates, and for each treatment 15 chicks per repetition: 0, 1, 5, and 10% (T0-T3), respectively. The results of this study showed that fenugreek seeds contain good amounts of protein, fat, ash and carbohydrates, which are 24.92, 8.82, 3.08 and 54.28 respectively. Fenugreek seeds also have high levels of tannins, coumarins and flavones, followed by saponins,
... Show MoreAbstract
The study was conducted in Baghdad and aimed to:
The impact of moving the educational activities in the conservation of literary
texts and the development of literary taste in the fifth grade students moral "by
verifying the validity of hypotheses Elsafreeten following forms:
The first hypothesis:
- There are no differences in women with statistical significance between means
of scores of students three experimental groups, the experimental group first
used upstream activities in the teaching material of literature and texts, the
second experimental group used the activities of building in the teaching
material itself and the experimental group the third use activities concluding
taught the same
Abstract
The current research aims to identify the impact of triangular bridging strategy in the acquisition of sociology of fourth-stage students. To achieve the research objective, the following null hypotheses were adopted: there are no statistically significant differences at a significance level (0, 05) between the average grades of the experimental group students who studied the triangular bridging strategy in acquiring concepts of sociology and average grades of the control group. The researcher has selected the fourth-stage students from Alexandronah School for girls that s related to the Directorate General of Baghdad the sample consisted of (87) students at litera
... Show MoreBiological activity of the carotenoids which are produced fromchemically-mutaed local isolate of Rhodotorula mucilaginosawas studied. The results showed variation of inhibition activity of caritenoids against different types of pathogenic bacteria include, Staph aureus, E. coli, B. subtilis and Salmo. typh., the number declined from 2×107cell/ml to 2×104, 5×104, 2×105, 9×105 cell/ml respectively after 24hour. The produced carotenoids from alocal mutant Rhodotorula mucilaginosa revealed an antioxidant activity as free radical removal of 85.6%. Carotinoides revealed a highest stability in petroleum ether solvent for 30 days at room temperature. It found that the pigment was more stability in sesame oil compared with sun flower and coc
... Show More