Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Gender mainstreaming is a goal for building a society characterized by justice and equality. Gender mainstreaming requires a clear understanding of the concept. Therefore, the research focuses on the concept of gender and how it was addressed in the literature through which the concepts related to gender were extracted which is represented by the role and social status through which the relationship of gender can be measured. In order to find out the basis for the different status and roles of both sexes in societies, the interpreted theories of gender were addressed, through which the most important factors affecting gender relations, such as biological, social and economic factors, as well as political systems, were discussed. Due to t
... Show MoreIn this paper, the effect size measures was discussed, which are useful in many estimation processes for direct effect and its relation with indirect and total effects. In addition, an algorithm to calculate the suggested measure of effect size was suggested that represent the ratio of direct effect to the effect of the estimated parameter using the Regression equation of the dependent variable on the mediator variable without using the independent variable in the model. Where this an algorithm clear the possibility to use this regression equation in Mediation Analysis, where usually used the Mediator and independent variable together when the dependent variable regresses on them. Also this an algorithm to show how effect of the
... Show More(1) Background: Sleeping disorders are frequently reported following traumatic brain injury (TBI). Different forms of sleeping disorders have been reported, such as sleepiness, insomnia, changes in sleeping latency, and others. (2) Methods: A case-control study with 62 patients who were victims of mild or moderate TBI with previous admissions to Iraqi tertiary neurosurgical centers were enrolled as the first group, and 158 patients with no history of trauma were considered as the control. All were 18 years of age or older, and the severity of the trauma and sleep disorders was assessed. The Pittsburgh sleep quality index was used to assess sleep disorders with average need for sleep per day and average sleep latency were assessed in
... Show MoreThe Almighty Allah has addressed His followers by advising them to follow the example of the prophet (PBUH). Allah says: (INDEED IN THE MESSENGER OF ALLAH YOU HAVE A GOOD EXAMPLE TO FOLLOW). So, He was a true and everlasting example for the people to follow and imitate in all aspects of life. Knowledge and learning, especially Qura'nic knowledge, are among the priorities.
The present study is concerned with how to follow the Prophet example (PBUH) in the field of Qur'an reciting. It aims at showing His instructions on Qur'an reciting, and how He was followed by His Companions. The present study falls into an introduction and four sections. Section One deals with the commands given by Allah to follow His prophet. Second Two
... Show MoreThis research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in
... Show MoreWith the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.
Blockchain technology relies on cryptographic techniques that provide various advantages, such as trustworthiness, collaboration, organization, identification, integrity, and transparency. Meanwhile, data analytics refers to the process of utilizing techniques to analyze big data and comprehend the relationships between data points to draw meaningful conclusions. The field of data analytics in Blockchain is relatively new, and few studies have been conducted to examine the challenges involved in Blockchain data analytics. This article presents a systematic analysis of how data analytics affects Blockchain performance, with the aim of investigating the current state of Blockchain-based data analytics techniques in research fields and
... Show MoreLarge amounts of plasma, the universe’s fourth most common kind of stuff, may be found across our galaxy and other galaxies. There are four types of matter in the cosmos, and plasma is the most common. By heating the compressed air or inert gases to create negatively and positively charged particles known as ions, electrically neutral particles in their natural state are formed. Many scientists are currently focusing their efforts on the development of artificial plasma and the possible advantages it may have for humankind in the near future. In the literature, there is a scarcity of information regarding plasma applications. It’s the goal of this page to describe particular methods for creating and using plasma, which may be us
... Show MoreThis paper is specifically a detailed review of the Spatial Quantile Autoregressive (SARQR) model that refers to the incorporation of quantile regression models into spatial autoregressive models to facilitate an improved analysis of the characteristics of spatially dependent data. The relevance of SARQR is emphasized in most applications, including but not limited to the fields that might need the study of spatial variation and dependencies. In particular, it looks at literature dated from 1971 and 2024 and shows the extent to which SARQR had already been applied previously in other disciplines such as economics, real estate, environmental science, and epidemiology. Accordingly, evidence indicates SARQR has numerous benefits compar
... Show MoreTransdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show More