Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Thin films whose compositions can be expressed by (GeS2)100-xGax (x=0, 6,12,18) formula were obtained by thermal evaporation technique of bulk material at a base pressure of ~10-5 torr. Optical transmission spectra of the films were taken in the range of 300-1100 nm then the optical band gap, tail width of localized states, refractive index, extinction coefficient were calculated. The optical constants were found to increase at low concentration of Ga (0 to12%) while they decreases with further addition of Ga. The optical band gap was found to change in opposite manner to that of optical constants. The variation in the optical parameters are explained in terms of average bond energy
... Show MoreThe idea of a homomorphism of a cubic set of a KU-semigroup is studied and the concept of the product between two cubic sets is defined. And then, a new cubic bipolar fuzzy set in this structure is discussed, and some important results are achieved. Also, the product of cubic subsets is discussed and some theorems are proved.
A method has been demonstrated to synthesise effective zeolite membranes from existing crystals without a hydrothermal synthesis step.
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
In the last years, the self-balancing platform has become one of the most common candidates to use in many applications such as flight, biomedical fields, industry. This paper introduced the simulated model of a proposed self-balancing platform that described the self–balancing attitude in (X-axis, Y-axis, or both axis) under the influence of road disturbance. To simulate the self-balanced platform's performance during the tilt, an integration between Solidworks, Simscape, and Simulink toolboxes in MATLAB was used. The platform's dynamic model was drawn in SolidWorks and exported as a STEP file used in the Simscape Multibody environment. The system is controlled using the proportional-integral-deriva
... Show MoreAmeloblastic fibroma is a rare benign tumor usually affects the first two decades of life. The neoplasm is more predominant in mandibular molar-premolar region and rarely affects the maxilla. In this report, we present a couple of Ameloblastic fibroma cases, affecting boys at their 1st decade. The lesions were presented as swellings of their maxilla, which is atypical location. Radiographic images showed well-defined radiolucency containing areas of radio-opacities and impacted teeth. Differential diagnosis was established as cystic/neoplastic conditions. The lesions were incised and histopathologically diagnosed as Ameloblastic fibroma, since they were composed of immature odontogenic mesenchymal and epithelial cells showing different c
... Show MoreThis paper deals with constructing mixed probability distribution from mixing exponential