Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu
... Show MoreThe impact of management control systems (MCS) on organizations performance empirical research has been the subject of numerous studies during the past decade in developed and emerging economies. In the contemporary competitive, complex and changing global business environment, firms are being challenged to adopt business models that enable them to address the strategic uncertainties and risks they face in their business environments. The main issue of this study is that management accounting researchers argue that one of the ways firms can continually rejuvenate themselves to survive and succeed in these complex and uncertain environments is to understand the role of management control systems in Formulating a b
... Show MoreThe migration from IPv4 to IPv6 can not be achieved in a brief period, thus both protocols co-exist at certain years. IETF Next Generation Transition Working Group (NGtrans) developed IPv4/IPv6 transition mechanisms. Since Iraq infrastructure, including universities, companies and institutions still use IPv4 protocol only. This research article tries to highlight, discuss a required transition roadmap and extend the local knowledge and practice on IPv6. Also, it introduces a prototype model using Packet tracer (network simulator) deployed for the design and implementation of IPv6 migration. Finally, it compares and evaluates the performance of IPv6, IPv4 and dual stack using OPNET based on QoS metrics such as throughput, delay and point to
... Show MoreIn present days, drug resistance is a major emerging problem in the healthcare sector. Novel antibiotics are in considerable need because present effective treatments have repeatedly failed. Antimicrobial peptides are the biologically active secondary metabolites produced by a variety of microorganisms like bacteria, fungi, and algae, which possess surface activity reduction activity along with this they are having antimicrobial, antifungal, and antioxidant antibiofilm activity. Antimicrobial peptides include a wide variety of bioactive compounds such as Bacteriocins, glycolipids, lipopeptides, polysaccharide-protein complexes, phospholipids, fatty acids, and neutral lipids. Bioactive peptides derived from various natural sources like bacte
... Show MoreBackground: Maxillary sinusitis can arise after sinus floor elevation surgery and should be treated immediately to prevent further complications which included dental implants failure, graft lost, and oro-antral fistula. This is the first systematic review to assess the incidence, causes, and treatment of sinusitis after sinus lift surgery. Materials and methods: An electronic search included MEDLINE (PUBMED) data base site was carried out for articles involving development of sinusitis after sinus lift surgery from September 1997 up to April, 8, 2017. The search was done and reviewed by two independent authors. Results: The total results of electronic search were (182) abstracts and articles, the extracted articles which involved develo
... Show MoreThe aim of this study was to critically appraise and synthesize the best available evidence on the effectiveness of interventions suitable for delivery by nurses, designed to enhance cardiac patients' adherence to their prescribed medications.
Cardiac medications have statistically significant health benefits for patients with heart disease, but patients' adherence to prescribed medications remains suboptimal.
A systematic quantitative review of intervention effects.
Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More