Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
That God Almighty coast with good things to eat and permitted smug, which did not like Muharram, and the Almighty said: Eat well and do good.
The Prophet peace be upon him if making him some of his friends food and preen it on as it was their situation at the time and then called him an answer to that, and most people prefer to eat and drink on the other other sanctuary Kalmbus and the audio and others
This valve is intended for use in valves for steering movement, using the qualities of the Magneto-rheological (MR) fluid to regulate the fluid, direct contact without the utilization of moving parts like a spool, a connection between electric flux, and fluid power was made, The simulation was done to employ the" finite element method of magnetism (FEMM)" to arrive at the best design. This software is used for magnetic resonance valve finite element analysis. The valve's best performance was obtained by using a closed directional control valve in the normal state normally closed (NC) MR valve, with simulation results revealing the optimum magnetic flux density in the absence of a current and the shedding condition, as well as the optimum
... Show MoreThis paper represents an experimental study on the application of smart control represented by the use of the fuzzy logic controller. Two-link flexible manipulators that are used in airspace and military applications are made of flexible materials characterized by low frequency and damping ratio. To solve this problem, this paper proposes the use of smart materials (piezoelectric transducers), where each link is bonded with a pair of piezoelectric transducers that act as a sensor and another as an actuator. As the arm vibrates because of the movement generated by the motor, this voltage is controlled by a regulator inside the LABVIEW® 2020 software and sends the output control voltage to the piezoelectric actuator. Experimental results
... Show MoreOne of the globalization results is (VAT) , so it is important to consider its results and impact on the tax system.
The Iraqi economy having wittnisd an acute transition period , still in need for a better care in aim to back it, especialy from the tax system.
The research is concerned with the (VAT) and its details –And for five chapters all the problomes connect are displayed .But yet the new system does not comply with the modern development and this is one of the defects of (VAT) in Iraq.
The history of (VAT)was also studied mentiorned and studied.
As a conclusion (VAT) is one of the m
... Show MoreMobile advertising has become the product of an influential actor in the creation of design ideas that attract the recipient, according to the needs of the society and the interactions of the technological technical age, what the technologies of the mock programs do and what corresponds to the expectations of the recipient, and what the design methods achieve of synchronization and sound in which all The research has found ways to address the most exciting and important snapshots and focus on diversity and diversity, formality, image and color, and what the optical degrees and chromatography achieve sought to attract attention, which contributes from the point of view of the researchers in the field of accuracy, clarity, attention and co
... Show MoreThis research was conducted in order to monitor and measure the dimensions of media policy in satellite channels directed from the point of view of the communicator, and this research is classified among the descriptive studies, as the researcher used the survey method to answer the questions that were formulated in light of the research problem represented by the main question: What are the dimensions of media policy in Directed satellite channels? .
To achieve the objectives of the study, the researcher used the following tools:
The questionnaire, in order to survey the attitudes of communicators about the extent to which the media policy during crises reflects on their professional standards. The research community is represente
The current study aims at investigating the effect of cooperative learning (Jigsaw) on motivation of female students. Department of kindergarten to learn Human biology. This is of be dove through verification of the hypothesis that there is no significant difference at the 0.05 level between the motivation of experiment of group subjects who study according to (Jigsaw) cooperative learning and that of the control group subjects who study traditionally.
The study is limited to female students al the first year-Department of kindergarten college of Education for women university of Baghdad during the academic year 2007-2008.
An experiment of design of partial control and post-test for two groups is used. The experiment groups consist
In this paper, we will illustrate a gamma regression model assuming that the dependent variable (Y) is a gamma distribution and that it's mean ( ) is related through a linear predictor with link function which is identity link function g(μ) = μ. It also contains the shape parameter which is not constant and depends on the linear predictor and with link function which is the log link and we will estimate the parameters of gamma regression by using two estimation methods which are The Maximum Likelihood and the Bayesian and a comparison between these methods by using the standard comparison of average squares of error (MSE), where the two methods were applied to real da
... Show MoreResumen:
La traducción de los dos verbos ser y estar no es una tarea tan simple como piensan muchas personas, sino es una de las complicadas y difíciles tareas, ya que el traductor tiene que saber y perfeccionar los correctos casos gramaticales relacionados con esos dos verbos auxiliares tanto el verbo ser como el verbo estar, especialmente en la frase nominal para que pueda dar una clara y correcta traducción. Usados con el mismo adjetivo, "ser" comunicará una cualidad que es parte de la identidad o naturaleza del sujeto, mientras que "estar" comunicará un estado o circunstancia del mismo. Este e
... Show MoreObjective(s): The present study aims at identifying the Iraqi Colleges of Nursing Deans' leadership
behaviors effectiveness and faculty members' motivation towards work in these colleges.
Methodology: Descriptive design has been used for the sample survey manner, which is the
appropriate approach to the study of social phenomena in the field where provides data on the reality of
these phenomena and relations between the causes and consequences and an analysis of it and perhaps
the factors affecting it and how it appears. The study relies on a questionnaire to collect data from the
participants which is composed of (86) items distributed on three axes: First, the demographic
characteristics which are composed of (8) i