Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
This research is qualitative in nature. It aims to investigate descriptively, analytically, and comparatively the modern AK model represented by the Sudan Open University Series, and the European framework, the common reference for Teaching Foreign Languages, to uncover what was achieved in them in terms of communication and language use. Accordingly, an integrated, multi-media approach has been adopted to enable the production and reception activities, and the spread of Arabic in vast areas of the world. Such a spread helps Arabic language to be in a hegemonic position with the other living languages. The study is based on getting benefit from human experiences and joint work in the field of teaching Arabic to non-Arabic speakers to mee
... Show More
Flavonoids were extracted from Zizyphus spina-christi leaves by Ethyl acetate after acid digested and used as antioxidant. The dried extract was added separately to each sample of fat extracted from hallow cow and sheep bones as follows: T1 cow fat, T2 control for cow fat, T3 sheep fat and T4 control for sheep fat (the control T2 and T4 reffered to samples without added antioxidant).
Samples were stored at -18, 5, 25 and 55 °C for 28 days. The storage trials were conducted at -18, 5 and 25 °C for 28 days for T1, T2, T3 and T4. The chemical indices examined initially and at the end of storage period. PVs was 1.46, 1.46, 1.8 and 1.8 meq/ Kg oil respectively, FFA values were 0.245, 0.245, 0.244 and 0.244% respectively and TBA va
This study is about the subject of exclusion of the application of foreign law as it violates the Islamic Sharia law in terms of Article (27) of the UAE Civil Transactions Law as amended in 2020, which before that date included all disputes involving a foreigner. According to the amendment referred to, the application of Islamic Sharia law shall be limited to civil transactions with the exclusion of personal status affairs.
The study concluded with many results, the most important of which is that the current text of Article (27) of the Civil Transactions Law as amended in 2020 is unable to explain what the judge may do in cases where the foreign law jurisdiction is referred to in one of the excluded texts, namely those related t
... Show MoreBackground: Venous thromboembolic disease (VTED) is a well known complication that occur following total knee arthroplasty (T.K.A). One of the (VTED) forms is asymptomatic deep venous thrombosis with an incidence has been estimated to be up to ³ 20% in patients undergone primary T.K.A , despite routine treatment with heparin postoperatively.
Objectives : is to assess the prevalence of post-operative asymptomatic D.V.T among patients receiving two different thromboprophylactic drugs after T.K.A.
Patients and methods: 68 patients who had T.K.A were randomly divided for the purpose of post-operative thromboprophylaxis into two groups , group [ A ] (control group) consisted
... Show MoreThe purpose of this research is to demonstrate the impact of deposit insurance to reduce banking risks, as banks in various countries of the world face a variety of risks that led to banking and financial crises that led to the failure and bankruptcy of many of its bank, which led to the banks to find quick and appropriate solutions to get rid of these difficulties These solutions include the use of bank deposit protection system for the many risks and sequences of crises that accompanied the Iraqi banking work of thefts, forgery, embezzlement and changing and unstable circumstances. The importance of studying the subject of research through the theoretical framework of banking risks as well as the framework of consideration In order to
... Show Moreاصدرت المحكمة الاتحادية العليا قرارها بالعدد (9/اتحادية/2023) في 14/11/2023 والمتضمن الحكم بانهاء عضوية النائب ( ل.م.ح.د) وعضوية رئيس مجلس النواب (م.ر.ح) اعتباراً من تاريخ صدور الحكم في 14/11/2023 في قضية تتخلص وقائعها قيام النائب ( ل.م.ح.د) باقامة دعوى ضد رئيس مجلس النواب (اضافة لوظيفته ) حول قيام الاخير باستخدام طلب للاستقالة قدم من قبله بتاريخ 7/5/2022 اثناء الدورة النيابية الرابعه تحت الضغط والاكراه لاسباب سياسية ، ولم يتخذ رئ
... Show MoreThese deposits take many forms like current acc, deposits in order to growth and serve national economy Various in varicose perspectives .
The problem of this paper its concern with un applied the mathematical models that used in profitability analysis of current acc , and deposits in view of risk, profit efficiency and financial leverage for this reason the paper discussion use the cumulate mathematical model to solve these problem, that content three variables that be used to measuring profitability by consequent replacement method by stable base and by moving base for 2007 – 2009 applied the data collect from Iraq middle east bank. &nbs
... Show MoreMost companies use social media data for business. Sentiment analysis automatically gathers analyses and summarizes this type of data. Managing unstructured social media data is difficult. Noisy data is a challenge to sentiment analysis. Since over 50% of the sentiment analysis process is data pre-processing, processing big social media data is challenging too. If pre-processing is carried out correctly, data accuracy may improve. Also, sentiment analysis workflow is highly dependent. Because no pre-processing technique works well in all situations or with all data sources, choosing the most important ones is crucial. Prioritization is an excellent technique for choosing the most important ones. As one of many Multi-Criteria Decision Mak
... Show More