Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Journal Of Kufa For Chemical Sciences
Studying Analytical Methods for Monitoring of Antibiotics in Environmental Waters, A review
...Show More Authors

In recent years, there has been a rise in interest in the study of antibiotic occurrence in the aquatic environment due to the negative consequences of prolonged exposure and the potential for bacterial antibiotic resistance. Most antibiotic residues from treated wastewater end up in the aquatic environment as they are not eliminated in facilities that treat wastewater. Antibiotics must be identified in influent and effluent wastewater using reliable analytical techniques for several reasons. Firstly, monitoring antibiotic presence in aquatic environments. Secondly, assessing environmental risks, computing wastewater treatment plant removal efficiencies, and estimating antibiotic consumption. Therefore, this work aims to provide an overview

... Show More
Preview PDF
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
REVIEWING THE IMPLICATIONS OF TRAINING FOR ACADEMIC ADMINISTRATION STAFF AT CENTRAL MICHIGAN UNIVERSITY
...Show More Authors

Training has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 14 2018
Journal Name
Arab Science Heritage Journal
المنهج المنهج الأدبي في كتاب "أدب الكتاب" للصولي (ت335هـ) دراسة منهجية
...Show More Authors

It is summarized that Abu-Baker Al-Soly is one of Arabic Muslim scientists who had special style in literary writing specifically in sciences and knowledge that had depended on the encyclopedia culture gained from various fields of science , this means that he was an individual who had participated to characterize features of Islamic –Arabic history enhanced the rules of it , this matter would encourage us to know the method and style of writing in the field of intellectual life in which the writer depended on the procedures direction of scientists that he lived in the Abbasid era .

View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Arab Science Heritage Journal
الخطوط الخطوط الدررالكامنه لابن حجر العسقلاني(ت852هـ) (دراسة منهجية) في كتاب
...Show More Authors

Ibn Hajar is one of historian who had a role in historical writing represented by his writings in those active participation in the Arab-Islamic civilization, particularly his approach to intellectual, and pictures of us in his book that's part of the intellectual heritage, but a line that was a key part of the book, any manuscript

View Publication Preview PDF
Publication Date
Wed Mar 30 2016
Journal Name
College Of Islamic Sciences
Community organization and its impact On social security
...Show More Authors

The world went through turmoil before the sixth century AD, and human societies were in conflict and rivalry, each strong state is a weak state-dependent, but the dominant societies made the slave societies to them .. And thus made many societies or civilizations system of classes, and differentiation between members of one community, Weakened its strength and go alone. As the Islamic society in the present weak and weak and falling to the lowest levels of civilizational underdevelopment in the organization of society and social security contrary to what it was Islamic civilization, because of our distance from the heavenly instructions, and this prompted many to walk behind Western ideas aimed at the demolition of Islamic civilization,

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
College Of Islamic Sciences
Community organization and its impact on social security
...Show More Authors

Praise be to God, Lord of the worlds, and prayers and peace be upon our master Muhammad and upon his family and companions.
       We see human societies differ from one society to another in organizing social life, and each according to the foundations and rules prepared by the main thing in the welfare and prosperity.
That is why we see eastern societies differ from western societies in many patterns and various ways of reaching that sophistication, until Islam came and gave the proper model in raising society at that time to the best and highest social levels, because it is based on heavenly rules and foundations and not status as in previous civilizations.
And when the Islamic community has

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 30 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
...Show More Authors

The sale of facial features is a new modern contractual development that resulted from the fast transformations in technology, leading to legal, and ethical obligations. As the need rises for human faces to be used in robots, especially in relation to industries that necessitate direct human interaction, like hospitality and retail, the potential of Artificial Intelligence (AI) generated hyper realistic facial images poses legal and cybersecurity challenges. This paper examines the legal terrain that has developed in the sale of real and AI generated human facial features, and specifically the risks of identity fraud, data misuse and privacy violations. Deep learning (DL) algorithms are analyzed for their ability to detect AI genera

... Show More
View Publication
Scopus (11)
Crossref (5)
Scopus Crossref
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Prof. Mohammad Al-Drubi's Manuscripts Editing Methodology
...Show More Authors

Efforts of evaluating manuscripts have developed into sciences that take interest into the development of authorship movement. Expanding the rules and fundamentals of this scientific process along with the growing use of modern methods and techniques contributed further to its development.
Such a disciplinedemands comprehensive knowledge in various fields to reach the most valid results that help reveal significant aspects of the cultural heritage since such a process is an ethical responsibility .Therefore, the editor has to be patient and honest in correcting mistakes, choosing the most acceptable narration and pinpointing the additions and differences as well as other requirements of serious editing.
The study was divided into a

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref