Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Training has an effect on employees’ performances. Accordingly, the person who is responsible for employees’ development must figure out the most effective way to train and develop employees. Central Michigan University (CMU) has recognized the importance of providing appropriate training for employees who have a duty in advising students. The reason is that these employees have a significant impact on students’ educational performances. Thus, special attention to this category of employees is needed to improve advising quality. This research attempted to explore the impact of training on academic advising at CMU. Face-to-face interviews and online surveys were used as data collection tools for this study. The study scope c
... Show Moreإن موضوع الشرق الأوسط بشكل عام اتخذ أهمية كبيرة في الكتابات والمؤلفات التي صدرت منذ بداية النصف الأول من عقد التسعينات من القرن المنصرم مع بدايات مشاريع السلام التي أعقبت انهيار الاتحاد السوفيتي وتغير الخارطة السياسية والاقتصادية والايديولوجية للعالم .وعلى الرغم ان المصطلح ليس بجديد الا ان تعابير المصطلح وددلالاته تتغير مع تغير موازين القوى واتجاهات المصالح. إذ انتقل من مصطلح جغرافي الى
... Show MoreSoils that cause effective damages to engineer structures (such as pavement and foundation) are called problematic or difficult soils (include collapsible soil, expansive soil, etc.). These damages occur due to poor or unfavorited engineering properties, such as low shear strength, high compressibility, high volume changes, etc. In the case of expansive soil, the problem of the shrink-swell phenomenon, when the soil reacts with water, is more pronounced. To overcome such problems, soils can be treated or stabilized with many stabilization ways (mechanical, chemical, etc.). Such ways can amend the unfavorited soil properties. In this review, the pozzolanic materials have been selected to be presented and discussed as chem
... Show MoreAn anal fissure which does not heal with conservative measures as sits baths and laxatives is a chronic anal fissure. Physiologically, it is the high resting tone of the internal anal sphincter that chiefly interferes with the healing process of these fissures. Until now, the gold standard treatment modality is surgery, either digital anal dilatation or lateral sphincterotomy. However, concerns have been raised about the incidence of faecal incontinence after surgery. Therefore, pharmacological means to treat chronic anal fissures have been explored. A Medline and pub med database search from 1986-2012 was conducted to perform a literature search for articles relating to the non-surgical treatment of chronic anal fissure. Pharmacological
... Show MoreIncreasing requests for modified and personalized pharmaceutics and medical materials makes the implementation of additive manufacturing increased rapidly in recent years. 3D printing has been involved numerous advantages in case of reduction in waste, flexibility in the design, and minimizing the high cost of intended products for bulk production of. Several of 3D printing technologies have been developed to fabricate novel solid dosage forms, including selective laser sintering, binder deposition, stereolithography, inkjet printing, extrusion-based printing, and fused deposition modeling. The selection of 3D printing techniques depends on their compatibility with the printed drug products. This review intent to provide a perspecti
... Show MoreTeresa Fitzpatrick presents a connection between oppressed women and the plant of Wisteria in gothic fiction in her article “Wisteria: A Female Eco-Gothic Metaphor in American Fiction Through the Ages.” The connection between women and nature is common in literature as women are usually compared to the beauty or ferocity of flowers, rivers, or natural phenomena in general. The connection extends to the architecture and sort of plants that appear in gothic literature. Gothic novels have routinely been connected to the secrets and life stories of women who cannot have the liberty to live or share them outside their homes. A fearful house with a prisoned person, ghost, or a secret is mostly normally found in gothic writing. Women have exce
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreDeveloping an efficient algorithm for automated Magnetic Resonance Imaging (MRI) segmentation to characterize tumor abnormalities in an accurate and reproducible manner is ever demanding. This paper presents an overview of the recent development and challenges of the energy minimizing active contour segmentation model called snake for the MRI. This model is successfully used in contour detection for object recognition, computer vision and graphics as well as biomedical image processing including X-ray, MRI and Ultrasound images. Snakes being deformable well-defined curves in the image domain can move under the influence of internal forces and external forces are subsequently derived from the image data. We underscore a critical appraisal
... Show MoreCerium (III), Neodymium (III) and Samarium (III) Complexes existent a wide range of implementation that stretch from their play in the medicinal and pharmaceutical area because of their major significant pharmacological characteristic such as antifungal, anti-cancer, anti-bacterial ,anti-human immunodeficiency virus ,antineoplastic, anti-inflammation,inhibition corrosion,in some industrial (polymers, Azo dye).It is likely to open avenuesto research among various disciplines such as physics, electronics, chemistry and materials science by these complexes that contain exquisitely designed organic molecules.This paper reviews the definition, importance and various applications of Cerium (III), Neodymium (III) and Samarium (III) Complexes anddi
... Show More