Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Optimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati
... Show MoreOptimization of gas lift plays a substantial role in production and maximizing the net present value of the investment of oil field projects. However, the application of the optimization techniques in gas lift project is so complex because many decision variables, objective functions and constraints are involved in the gas lift optimization problem. In addition, many computational ways; traditional and modern, have been employed to optimize gas lift processes. This research aims to present the developing of the optimization techniques applied in the gas lift. Accordingly, the research classifies the applied optimization techniques, and it presents the limitations and the range of applications of each one to get an acceptable level of accura
... Show MoreThis study presented more than twenty books that dealt with the subject of (Weights of the Tawshih art), whether their study was independent and dedicated the art of Tawshih as a part of book.
This study presented more than twenty books that dealt with the subject of (Weights of the Tawshih art), whether their study was independent and dedicated the art of Tawshih as a part of book.
Gender and culture are among the factors that influence the process of understanding and interpreting different types of communication, especially images. The current study, which is a part of a master’s thesis, aims at investigating the role of gender and culture in interpreting and understanding the caricatures that deal with women’s issues in Arab societies. To this end, the researchers adopted Barthes’ (1957) concepts of denotation and connotation in his theory of mythologies in addition to Langacker’s (1987) theory of (Domains). The research concludes that the female subjects have better cognitive abilities in investing the signs within the selected caricatures. The other factor the study reached to is that the respondents
... Show MoreBreast cancer is the most repeatedly detected cancer category and the second reason cause of cancer-linked deaths among women worldwide. Tumor bio-indictor is a term utilized to describe possible indicators for carcinoma diagnosis, development and progression. The goal of this study is to evaluate part of some cytokines and biomarkers for both serum and saliva samples in breast cancer then estimate their potential value in the early diagnosis of breast cancer by doing more researches in saliva, and utilizing saliva instead of blood (serum and plasma) in sample collection from patients. Serum and salivary samples were taken from 72 patients with breast cancer and 45 healthy controls, in order to investigate the following
... Show MoreIn this paper, the effect size measures was discussed, which are useful in many estimation processes for direct effect and its relation with indirect and total effects. In addition, an algorithm to calculate the suggested measure of effect size was suggested that represent the ratio of direct effect to the effect of the estimated parameter using the Regression equation of the dependent variable on the mediator variable without using the independent variable in the model. Where this an algorithm clear the possibility to use this regression equation in Mediation Analysis, where usually used the Mediator and independent variable together when the dependent variable regresses on them. Also this an algorithm to show how effect of the
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe Almighty Allah has addressed His followers by advising them to follow the example of the prophet (PBUH). Allah says: (INDEED IN THE MESSENGER OF ALLAH YOU HAVE A GOOD EXAMPLE TO FOLLOW). So, He was a true and everlasting example for the people to follow and imitate in all aspects of life. Knowledge and learning, especially Qura'nic knowledge, are among the priorities.
The present study is concerned with how to follow the Prophet example (PBUH) in the field of Qur'an reciting. It aims at showing His instructions on Qur'an reciting, and how He was followed by His Companions. The present study falls into an introduction and four sections. Section One deals with the commands given by Allah to follow His prophet. Second Two
... Show More(1) Background: Sleeping disorders are frequently reported following traumatic brain injury (TBI). Different forms of sleeping disorders have been reported, such as sleepiness, insomnia, changes in sleeping latency, and others. (2) Methods: A case-control study with 62 patients who were victims of mild or moderate TBI with previous admissions to Iraqi tertiary neurosurgical centers were enrolled as the first group, and 158 patients with no history of trauma were considered as the control. All were 18 years of age or older, and the severity of the trauma and sleep disorders was assessed. The Pittsburgh sleep quality index was used to assess sleep disorders with average need for sleep per day and average sleep latency were assessed in
... Show More