Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The bilateral sagittal split osteotomy (BSSO) is the most popular orthognathic procedure performed by maxillofacial surgeons to treat skeletal class II and class III and to correct mandibular asymmetries. The study aimed to evaluate the lingual splitting patterns and lateral bone cut end (LBCE) in bilateral sagittal split osteotomy (BSSO) and their relation with the ramal thickness and the presence of impacted third molars using cone beam computed tomography (CBCT). This prospective observational study included patients with mandibular prognathism who were treated with BSSO with or without Le Fort I osteotomy. Cone beam computed tomography was used to measure the ramal thickness preoperatively and to evaluate the LBCE, and the lingu
... Show MoreThe study aims to examine the reality of preparing the Arabic language teacher for non-native speakers by presenting the experience of the Arabic Language Institute at the International University of Africa. Thus, it addresses the following questions: How is it possible to invest the long scientific experiences in proposal and experiment preperations to qualify Arabic language teachers for non-native speakers? What is the reality of preparing an Arabic language teacher at the Institute? How did the Arabic Language Institute process teacher preparation? What are the problems facing the preparation of the Arabic language teachers and the most important training mechanisms used in that Institute?What problems faced the implementation of the
... Show MoreThrust blocks and restraint joints are the two most popular methods of counteracting the thrust force that generated at pipe fittings (bends, Tee, wye, reducers, dead ends, etc…). Both systems perform the same function, which is to prevent the joints from separating from the pipes. The aim of the study is to review previous studies and scientific theories related to the study and design of thrust blocks and restraint joints to study the behavior of both systems under thrust force and to study the factors and variables that affect the behavior of these systems. The behavior of both systems must be studied because they cannot be abandoned, as each system has conditions whose use is more feasible, scientific, and economic
... Show MoreCD40 is a type 1 transmembrane protein composed of 277 amino acids, and it belongs to the tumor necrosis factor receptor (TNFR) superfamily. It is expressed in a variety of cell types, including normal B cells, macrophages, dendritic cells, and endothelial cells, as a costimulatory molecule. This study aims to summarize the CD40 polymorphism effect and its susceptibility to immune-related disorders. The CD40 gene polymorphisms showed a significant association with different immune-related disorders and act as a risk factor for increased susceptibility to these diseases.
This comprehensive review examines the efficacy and safety of tumor necrosis factor-alpha (TNF-α) inhibitors in treating various autoimmune diseases, and focuses on their application in Iraqi patients. Elevated TNF-α levels are linked to autoimmune disorders, leading to the development of anti-TNF-α therapies such as infliximab, etanercept, adalimumab, certolizumab pegol, and golimumab, which have gained FDA approval for conditions like psoriasis, in¬flammatory bowel disease, ankylosing spondylitis, and rheumatoid arthritis. While these therapies demonstrate sig¬nificant therapeutic benefits, including improved quality of life and disease management, they also carry risks, such as increased susceptibility to infections and pote
... Show MoreBy March 2020, a pandemic had been emerged Corona Virus Infection in 2019 (COVID-19), which was triggered through the sensitive pulmonary syndrome (SARS disease corona virus- 2 (SARS COV-2). Overall precise path physiology of SARS COV-2 still unknown, as does the involvement of every element of the acute or adaptable immunity systems. Additionally, evidence from additional corona virus groups, including SARS COV as well as the Middle East pulmonary disease, besides that, fresh discoveries might help researchers fully comprehend SARS CoV-2. Toll-like receptors (TLRs) serve a critical part in both detection of viral particles as well as the stimulation of the body's immune response. When TLR systems are activated, pro-inflammatory cy
... Show MoreFor the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show More