Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show MoreDuring his tenure in Iraq, al-Hadjjaj bin Yusif undertook administrative and economic reforms as well as linguistic reform.
The efforts exerted by Abu al-Aswad al-Dawali to control the reading of the Holy Quran were not sufficient, so the melody and error continued and became more pronounced, especially since the letters were written until then without any distinguishing features.
Al- Hadjjaj bin Yusuf realized the seriousness of the continuation of these errors and what he talked with the days of the causes of division and disagreement between the Muslim community ordered his book to put these suspicious characters marks was at the head of the book Nasr bin Asim and Yehi bin Muammar
The current research studies the digital techniques in order to identify the treatments with graphic techniques for the theatrical scene, which includes a number of programs and treatment tools with digital technique to identify the visual and aesthetic dimensions and outputs achieved in the design of the theatrical scene in addition to the options, that they provide in the design of a system of hypotheses for the theatrical world, In order to be an experimental mediator in achieving the creative hypothesis, which limited the research with a pivotal objective which is: identifying the digital techniques employed in the graphic digital design for the scene in the theatrical show. The research lies in its objective limits stated in the met
... Show Morethe bank sect for any country is very important because its represent a major nerve to feed a verity economic and finance activities .development any state measure by development banking sets and its represent important factor to investors attract . and because important of this subject ,teen accounting rule is a specialized for it .its related by Disclosures in the Financial Statements Of Banks and The Similar Institutions, its accredit by auditing and accounting standard consul in republic of Iraq.in date 10/28/1998. &
... Show MoreThe transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreFree water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake). In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreThis research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions, (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear
... Show MoreThe developing countries, like our country Iraq suffer from deep comprehensive structural crisis, manifestations and a clear imbalance between the demand and the supply sides. The overall imbalance in the external balance. As a consequence, this caused the accumulation of foreign debts or failure in the implementation of economic development programs. The countries which are forced to resort to the International Monitoring Funds, and the World Bank for assistance and to express an opinion on policies that include restrictions controls that belong to the monetary, and fiscal side group, imposed on the economies crisis, as a condition for returning to normal which called reform programs. The organize of the events of radical changes in the
... Show MoreThe study aimed to prepare quick response codes to learn some of the technical skills of the second graders in the Faculty of Physical Education and Sports Sciences. The experimental method was used in the design of the experimental and control experimental and control groups. The research sample was represented by second-graders in the College of Physical Education and Sports Sciences / University of Baghdad, and by lot, the second division (a) was chosen to represent the experimental group that applied the inverse method using the QR code, and the second division (g) to represent the control group and applied the traditional method. (10) Students per group. After the tribal tests, his main experiment was carried out for 10 weeks with one
... Show More