Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreBackground: Transplantation has revolutionized
treatment of end- stage renal disease (ESRD) by proving
more cost effective than hemodialysis, with a lower
morbidity and improved quality of life.
Objective: To evaluate the development of these
complications in the first month postoperatively and
correlate their development to the type of donation
whether related or unrelated.
Methods: Fifty (50) patients aged (15-62) years, with a
mean age (34.46 ± 12.4 SD) years with (ESRD), who
underwent renal transplantation from September 2000 to
October 2002, were followed-up for one month
postoperatively clinically and by assessment of renal
function tests, sonographic and Doppler examinations.
Ureteral obs
A simple, sensitive, accurate and economic spectrophotometric method has been developed for the determination of sulfacetamide (SFA) in pure form, synthetic sample and urine. The method is based on diazotization of primary amine group of sulfacetamide with sodium nitrite and hydrochloric acid followed by coupling with chromotropic acid in alkaline medium to obtain a stable orange colored chromogen which exhibit a maximum absorption (λmax) at 511.5 nm. Different variables affecting the completion of reaction have been carefully optimized following the classical univariate sequence and modified simplex method (MSM). Under optimized conditions, Beer’s law obeyed in the concentration range of (0.5- &nbs
... Show MoreThis intervention study is composed on 55 patients at Saddam Center for Cardiac Surgery (Aben-Albetar) throughout the period from 1st of July 1997 to 15th of January 1999. The study aimed to evaluate the effectiveness of constructed nursing education program on reduction of complications and improving recovery among patients with Coronary Artery Bypass Graft (CABG) surgery through the application of repeated measures. The sample is divided into 27 patients who received the nursing educational program (study group) and 28 patients who continued to receive regular care (controls). Based on previous research meth
One of the most serious health disasters in recent memory is the COVID-19 epidemic. Several restriction rules have been forced to reduce the virus spreading. Masks that are properly fitted can help prevent the virus from spreading from the person wearing the mask to others. Masks alone will not protect against COVID-19; they must be used in conjunction with physical separation and avoidance of direct contact. The fast spread of this disease, as well as the growing usage of prevention methods, underscore the critical need for a shift in biometrics-based authentication schemes. Biometrics systems are affected differently depending on whether are used as one of the preventive techniques based on COVID-19 pandemic rules. This study provides an
... Show MoreIn this review of literature, the light will be concentrated on the role of stem cells as an approach in periodontal regeneration.
The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreMedia, especially press plays an important role in fighting corruption and tackling this phenomenon, which has become widespread in our society, through its effective role in raising awareness of the seriousness of spreading of corruption of all its forms in society.
All international conventions and agreements stress the necessity of the role of media and its importance in the light of corruption. All countries also commit themselves to the necessity of guaranteeing the freedom of media and the circulation of information and preparing it as a prerequisite for activating the People’s Control Mechanism and supporting measures and means to prevent and combat financial and administrative corruption more actively and effectively.
Co
The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show More