Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Gas lift is one of the most important artificial lift methods for increasing oil production, as wells often require this method after the reservoir's energy has decreased. In this research, an optimal gas lift system is designed for five horizontal wells in the Ahdab oil field, which suffers from low production. At the same time, water cut in some of these wells reaches 66%, while the productivity index is low in others, which makes the challenges clear, and a deep analysis is needed to find an optimal system. The Pipesim program is used to design the optimal gas lift system, which contains features that facilitate the implementation of the appropriate design and provide the ability to analyze and determine the optimal design v
... Show More: Cervical malignancy positioned as the fourth most prevalent disease among women around the world. HPVs especially HPV16 are the causative agent of cervical cancer, responsible of about 5% of all human cancers worldwide. Some researchers found that the fibronectin is repressed by the papillomavirus (HPV) type 16 E7 oncoprotein in both HPV-positive nontumorigenic and tumorigenic cell lines, while others found that the HPV oncoprotein increase the levels of fibronectin. The aim is to study the effect of HPV infection on Fibronectin expression and their correlation onthe development of Cervicalcancinoma. The current retrospective study enrolled paraffinized blocks of two groups. The research included 30 cervical carcinomatous tissues as well
... Show MoreAn experimental study is carried out on the effect of vortex generators (Circular and square) on the flow and heat transfer at variable locations at (X = 0.5, 1.5, 2.5 cm) ahead of a heat exchanger with Reynolds number ranging from 62000< Re < 125000 and heat flux from 3000 ≤ q ≤ 8000 W/m2 .
In the experimental investigation, an apparatus is set up to measure the velocity and temperatures around the heat exchanger.
The results show that there is an effect for using vortex generators on heat transfer. Also, heat transfer depends on the shape and location. The circular is found t
... Show MoreAIM: The aim of this study was to measure the prevalence of myeloproliferative disorders in a sample of Iraqi patients and to measure the changes in patients’ blood parameters. BACKGROUND: Myeloproliferative disorders are a group of neoplasms affecting the bone marrow progenitor cells characterized by excess cells with a risk of transforming to acute leukemia. There is a gap in knowledge about the prevalence of Iraqi population. Thus, we investigated the prevalence and distribution of different types of myeloproliferative disorders in a sample of Iraqi patients. MATERIALS AND METHODS: Cross-sectional study is done at the National Center of Hematology from November 2019 till March 2020 on 75 patients who were diagnosed
... Show MoreA field experiment was carried out in the College of Agricultural Engineering Sciences - University of Baghdad, during the fall season of 2021 to find out which cultivated cultivars of maize are efficient under nitrogen fertilization. The experiment was applied according to an RCBD (split-plot design with three replications). The cultivars of the experiment (Baghdad, 5018, Sarah) supply three levels of nitrogen fertilizer, which are N1 (100 kg.N/ha), N2 (200 kg.N/ha) and N3 (300 kg.N/ha). The statistical analysis results showed the superiority of the Sarah genotype, which gave the highest value of SOD and CAT enzymes, reaching 11.59 units mg-1 and 10.76 units mg-1 . Protein sequentially, while cultivar5018 outperformed as it gave th
... Show MoreBackground: The type of dental implant surface is one of many factors that determine the success of implant restoration. This study aimed to study the effect of mixture of nano titanium oxide with nanohydroxyapatite coating of screw shaped CPTi dental implant on bond strength at bone implant interface by torque removal test related to two healing periods (2 and 6 weeks). Materials and methods: Dip coating process was performed to get an even coating layer on CPTi screws. X-ray diffraction (XRD) analysis and microscopical examination were performed on the coating surfaces of the CPTi. The tibia of 10 white New Zealand rabbits was chosen as implantation sites. The tibia of each rabbit received two screws, one was coated with mixture of nanoT
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More