Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
The Role of the Auditor in Confirming the Integrated Reports - An Exploratory Study on a Sample of External Auditors in Iraq-
...Show More Authors

  The aim of the research is to identify the extent of the ability to ensure the integrated reports by the auditor in verifying the credibility of these reports, and their implications for the benefit of all parties dealing with the economic unit, as well as measuring the impact of the assurance procedures followed by the auditors and their role in confirming these reports.

  The research methodology was designed after studying the previous literature related to the research variables, and then the relationship between these variables was tested, through the use of a questionnaire list. A questionnaire targeting the community of auditors in the local environment, and the results of the study wer

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The effect of Investment in Human Capital on Economic Growth in Algeria A standard Study within the period of: 1970 – 2015
...Show More Authors

The summary:

This research paper presents a standard economic study. This study aims to build an economic standard form of the investment effect in Human Capital on Economic Growth in Algeria. The study showed that there is an inverse relationship between the investment and human capital. This is expressed by expending on education and economic growth. This contradicts with the economic theory. Such matter could be explained by that expending on education does not contribute in the economic growth. This refers to that the education sector result does not employee or save jobs. Thus, it does not contribute in growth; in addition, the Algerian economy depends on petrol in the first class. This means the ab

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 07 2016
Journal Name
Journal Of The Faculty Of Medicine
Non discogenic lumbar radiculopathy ((A study of 104 cases))
...Show More Authors

AW Ali T, Journal of the Faculty of Medicine, 2016 - Cited by 1

View Publication
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Wed Oct 15 2014
Journal Name
International Journal Of Advanced Research
A survey/ Development of Passive Optical Access Networks Technologies
...Show More Authors

The bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
Constructing a Scale of Emotional Adjustment among Kindergarten Children
...Show More Authors

The aim of the current research is to construct a scale of emotional adjustment for kindergarten children and to set a standard for its evaluation. To achieve this, a scale consisting of (19) items was prepared. The mother of the child answered by adopting the method of self-report, which is expressed in the form of reporting terms, as each item represents a situation in the child's life and each situation has three alternatives to answer that represent various responses to the mentioned situation. One of the alternatives represents the emotionally adaptive response, which is given a degree (3), the second response expresses the emotional adjustment partly that took the degree of (2), and the third response expresses the weakness of emot

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 22 2024
Journal Name
Journal Of Petroleum Research And Studies
Optimizing Well Placement with Genetic Algorithms: A Case Study
...Show More Authors

Maximizing the net present value (NPV) of oil field development is heavily dependent on optimizing well placement. The traditional approach entails the use of expert intuition to design well configurations and locations, followed by economic analysis and reservoir simulation to determine the most effective plan. However, this approach often proves inadequate due to the complexity and nonlinearity of reservoirs. In recent years, computational techniques have been developed to optimize well placement by defining decision variables (such as well coordinates), objective functions (such as NPV or cumulative oil production), and constraints. This paper presents a study on the use of genetic algorithms for well placement optimization, a ty

... Show More
View Publication
Crossref
Publication Date
Wed Dec 03 2014
Journal Name
Al-kindy College Medical Journal
Limping in twenty years old male A Case Report
...Show More Authors

Background: Osteoid osteoma(OO) is a relatively common benign skeletal neoplasm of unknown etiology that is composed of osteoid and woven bone, usually seen in adolescent and young males Although, the clinical, radiological and scintigraphic features of OO have been well described, these features may be misleading or altered in the cases of lesser trochanter of the femur which is relatively uncommon location for OO with a few number of cases reported up to date. Case Presentation: We report a case of a 20-year-old man who presented with painful limpThe pain had begun six months earlier and was made worse by walking and by exercise., with normal initial X-rays .The diagnosis was made after six months when typical Computed tomography, magneti

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 30 2012
Journal Name
Al-hiqouq
The Maintenance Contract – A Comparative Study with Islamic Jurisprudence
...Show More Authors

Contemporary life is racing against time in its temptations and variables, and it has become shaped and changed in an amazing way in its various aspects and fields. This was facilitated by intellectual and scientific communication between civilizations, and the rapid progression in successive inventions and discoveries in the fields of science and arts of knowledge. This contributed to a great economic and commercial renaissance. Then, these economic developments entered the world into a very strong competition, which forced producers to calculate all production costs, to reach the highest profits by reducing the price of the produced commodity on the one hand, and achieving quality in appearance (especially) on the other hand. Since the ma

... Show More
View Publication
Publication Date
Wed Mar 20 2019
Journal Name
Journal Of Legal Sciences
Sale Based on an Open Price – A Comparative Study
...Show More Authors

The ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the

... Show More
View Publication