Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
A single specimen of the African catfish, Clarias gariepinus, was recorded for the first time in Baghdad, Iraq. The specimen was caught during a fish survey to document some local species in northern Baghdad (Al-Rusafa) on March 21, 2023. The total length of the specimen was 43 cm, and its weight was 590 grams. Some biometric measurements of the specimen were studied and found to be consistent with the general characteristics of the African catfish Clarias gariepinus (Burchell, 1822). It is possible that the fish entered Iraqi inland waters, specifically from the Euphrates River via Syria or from the Tigris River via Turkey.
The study aims to build a model that enhances trust-building for public and private banks to compare and determine the significant differences between public and private banks, by testing the impact of governance mechanisms (transparency, accountability, justice, independence, and social responsibility) (Agere, 2000) on trust-building strategies (trust and trust building, people management, work relations, training and development, leadership practices, and communications) (Ngalo, 2011; Stone et al., 2005), to indicate the level of employees’ awareness of the theoretical contents of the two variables and their importance to banking work, with the aim of improving performance. The main question is the role of governance mechanisms
... Show MoreAnkylosing spondylitis (AS) represents one kind of advanced arthritis formed via inflammatory stimuli long-term in the spin‘s joints. Interleukin (IL)-29 (interferon- lambda1(IFN- λ1)), interleukin (IL)-28A (interferon- lambda 2 (IFN- λ2)) and interleukin (IL)-28B (interferon- lambda 3(IFN-λ3)) are three interferon lambda (IFN- λs) molecules that have recently been identified as new members of the IFN family. IL-28B expression in ankylosing spondylitis (AS) is not well understood. 150 male healthy controls ((HC) and 160 males with AS as patients group participated in this study. Serum level and gene polymorphism were assessed using an enzyme-linked immunosorbent assay and Sanger sequencing for IL-28B, respectively. The results showed
... Show MoreBegging is an ancient social phenomenon since the Man's creation. It was simple at its beginning to get a living and the family needed, but presently, this simple social phenomenon converted to a big phenomenon which controlled by competent groups away from the values and principles. Their doings are far from humanity representing by the cutting of a hand or a foot and facial distortion or removed eye as a way of attracting people's emotions to get material and incorporeal helps; these doings became a trade which is exchanged by slave traders. Furthermore, different illegal and greedy methods were followed as a way of blackmailing others; contrariwise other cases of begging are doing by a people who real poor and needy. In this case, the
... Show MoreReservoir quality assessment is important for detecting hydrocarbon-bearing zones and guiding future enhancement strategies. This study presents a detailed petrophysical evaluation of the Mishrif Formation in the Buzurgan Oilfield, which was selected due to its strategic value through its significant remaining reserves which making it an ideal candidate for advanced evaluation techniques. This study aims for shale content, porosity, permeability, water saturation, net to gross, and lithology determination. Well log and core data were used together to establish accurate property estimations. Permeability prediction through conventional methods, like core permeability-porosity correlations, was highly dispersive due to the heterogenei
... Show MoreBackground: The aim of this study was to evaluate and compare the apical microleakage around retrograde cavities prepared with ultrasonic technique and filled with (Biodentineâ„¢) Materials and methods: 40 extracted single rooted human permanent maxillary teeth with mature apices were selected. The roots were prepared chemo-mechanically using k-files with crown-down technique and then obturated with lateral condensation gutta-percha technique. Teeth were divided into four main groups according to the cavity preparation method either manual or ultrasonic technique: Group A (n=10): A class I retrograde cavity at root end was prepared with traditional handpeice equipped and placement of Biodentine with manual condensation. Group B (n=10):
... Show MoreAlbizia lebbeck biomass was used as an adsorbent material in the present study to remove methyl red dye from an aqueous solution. A central composite rotatable design model was used to predict the dye removal efficiency. The optimization was accomplished under a temperature and mixing control system (37?C) with different particle size of 300 and 600 ?m. Highest adsorption efficiencies were obtained at lower dye concentrations and lower weight of adsorbent. The adsorption time, more than 48 h, was found to have a negative effect on the removal efficiency due to secondary metabolites compounds. However, the adsorption time was found to have a positive effect at high dye concentrations and high adsorbent weight. The colour removal effi
... Show MoreA procedure, depending on the derivatization and determination of aniline was depicted andvalidated in this study. 8-hydroxyquinoline (8-HQ) was used as the derivatizing agent for thedetermination of aniline. An optimization study was performed for the derivatization reaction, i.e.,the diazonium coupling reaction, the optimum parameters were as follows: 22 mM of hydrochloricacid, 54mM of sodium hydroxide, and 1.8mM of sodium nitrate. The optimization study of themethod of cloud point extraction (CPE) revealed that the extraction solvent was 0.5 ml of Triton X-100, the optimum temperature was 90 °C, and the incubation time was 25 min. The linearity,correlation coefficients, molar absorptivities, and limits of detection were improved using t
... Show MoreIn the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More