Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Toward a theoretical model of the terrorist personality and differentiation from psychopathic personality
...Show More Authors

The current theoretical research targeted to construct a model of terrorist personality and its differentiation from psychopathic personality . Several assumptions or theories of perspectives of psychopathic personality have been compared with the terrorist personality studies that concerned . The suggested theoretical  model is interrupting the terrorist personality . The conclusions , discussions are mentioned. Finally, recommendation is suggested .

View Publication Preview PDF
Publication Date
Wed May 03 2023
Journal Name
Annals Of Medicine & Surgery
Immunohistochemical expression of beta-catenin in ampullary adenocarcinoma: a cross-sectional retrospective study
...Show More Authors
Introduction:

Ampullary carcinomas are uncommon malignant tumours of the digestive system, they usually are adenocarcinomas presenting histologically as three types: intestinal, pancreaticobiliary and mixed. β-catenin is a multifunctional protein involved in physiological homoeostasis and intracellular adhesion. Abnormal nuclear accumulation of β-catenin has been described in many malignancies such as colon, breast, liver and others. The relationships between the immunohistochemical expression of β-catenin and the subtype, the grade and the stage of ampullary carcinoma are studied.

Material and m
... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Communications In Heat And Mass Transfer
Determination of a time-dependent thermal diffusivity and free boundary in heat conduction
...Show More Authors

View Publication
Scopus (18)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Feb 14 2023
Journal Name
Journal Of Educational And Psychological Researches
Panic Attacks Over COVID 19 : A Survey Study on An Iraqi University Sample
...Show More Authors

Abstract

The present paper attempts to detect the level of (COVID-19) pandemic panic attacks among university students, according to gender and stage variables.

To achieve this objective, the present paper adopts the scale set up by (Fathallah et al., 2021), which has been applied electronically to a previous cross-cultural sample consisting of (2285) participants from Arab countries, including Iraq. The scale includes, in its final form, (69) optional items distributed on (6) dimensions:  physical symptoms (13) items, psychological and emotional symptoms (12) items, cognitive and mental symptoms (11) items, social symptoms (8) items, general symptoms (13) items and daily living practices (12) items

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Baghdad College Of Dentistry
Assessment of the accuracy of a fifth generation apex locator (in vitro study)
...Show More Authors

Background: The use of electronic apex locators for working length determination eliminates many of the problems associated with the radiographic measurements (interference of anatomical structures, errors in projection such as elongation or shortening, and lack of three-dimensional representation). Its most important advantage over radiography is that it measures the length of the root canal to the apical constriction, not to the radiographic apex. The aim of this study was to assess the accuracy of a new fifth generation apex locator (Joypex 5) in recording the apical constriction and comparing it with a third generation apex locator (Root ZX) in vitro. Materials and method: Twenty four single-rooted sound human premolars, extracted for t

... Show More
Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Trajectory Tracking Control for a Wheeled Mobile Robot Using Fractional Order PIaDb Controller
...Show More Authors

Nowadays, Wheeled Mobile Robots (WMRs) have found many applications as industry, transportation, inspection, and other fields. Therefore, the trajectory tracking control of the nonholonomic wheeled mobile robots have an important problem. This work focus on the application of model-based on Fractional Order  PIaDb (FOPID) controller for trajectory tracking problem. The control algorithm based on the errors in postures of mobile robot which feed to FOPID controller to generate correction signals that transport to  torque for each driven wheel, and by means of dynamics model of mobile robot these torques used to compute the linear and angular speed to reach the desired pose. In this work a dynamics model of

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Iraqi Journal Of Physics
Bandwidth Improvement of a Cone-Inverted Cylindrical and Cross Hybrids Dielectric Resonator Antennas
...Show More Authors

In this work, two cone-inverted cylindrical and cross-hybrid dielectric resonator antennas are stacked and excited by the coaxial probe method with an operating standard resonant frequency of 5.438 GHz. A drawback of these standard Dielectric Resonator Antennas (DRAs) is their narrow bandwidth. For good antenna performance, a stacked DR geometry and a thick dielectric substrate having a low dielectric constant are desired since this provides large bandwidth, better radiation power, reduces conductor loss and nonappearance of surface waves. Many approaches, such as changing the shape of the dielectric resonator, have been used to enhance bandwidth. Using DRA, having the lowest dielectric constant, increases the bandwidth and the electroma

... Show More
View Publication Preview PDF
Crossref