Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 02 2014
Journal Name
International Journal Of Engineering Research And General Science
Security in Cloud Computing
...Show More Authors

Becloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The use of technology review and evaluate programs PERT to improve the cost method on the basis of activity: بحث تطبيقي في الشركة العامة للصناعات النسيجية /واسط
...Show More Authors

Suffer most of the industrial sector companies from high Kperfi magnitude of the costs of industrial indirect, lack of equitable distribution of these costs on the objectives of cost, increased competition, and the lack of proper planning in line and changes faced by the industrial sector (general) and sample (private), as well as the difficulty in re- directing efforts to improve profitability and in-depth analysis of activities, and to identify untapped resource activities, then link these activities to the final products  The research aims to apply the technology review and evaluate programs with the method (ABC) through the application stages of planning, scheduling and control and a comparison to get to the products of dev

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Study of Feminist Stylistic Analysis of Language Issues of Gender Representation in Selected Literary text
...Show More Authors

Stylistics is the analysis of the language of literary texts integrated within  various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are  unanticipatedly and carefully connected to issues of gender(Mills,1995:1)            &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Methodology of the concept of sovereignty in contemporary Islamic thought
...Show More Authors

The methodology of the concept of sovereignty in contemporary Islamic thought

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Issues of Media Trials in Iraqi after 2003
...Show More Authors

The Supreme Judicial Council decided on July 3, 2003, to set up a court to deal with the issues of publication and media. This court tries to solve the problems of media and publishing in both its civil and penal aspects. The decision of establishing the court represents a new and important step to be taken by the Iraqi Judicial Council for the tremendous development witnessed by media sector in general and press in particular especially after 2003.
This study includes two main axes: the first one deals with the most important crimes of publication in the Iraqi legislations such as the crimes of defamation, libel, insult, indecency, and incitement; the second deals with an analytical survey of the completed cases i.e. the issues tha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Journal Of Craniofacial Surgery
Risk Factors for Fistula Development Following Palatoplasty
...Show More Authors
Purpose:

The aim of this study is to assess the influence of some risks factors on the fistula development after palatoplasty to improve the outcome of the patients

Patients and Methods:

A total of 48 patients (the males were 22, The females were 26) were included in this study. All the patients were examined weekly for the first month postoperatively to assess any breakdown in the wound by inspection and by asking the parents for any nasal regurgitation during fluids feeding.

Results:
... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Fri May 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Factors associated with facial swelling severity following impacted lower third molar surgery: A prospective study
...Show More Authors

Background: The ultimate purpose of this prospective study is to estimate and measure swelling associated with surgical extrac¬tion of impacted mandibular third molars in different four post-operative times and to identify the risk factors associated with determination of their risk degree. Material and Methods: In this prospective cohort study 159 consecutive cases in which removal of impacted lower third molars in 107outpatients were evaluated. Five groups of variables have been studied which are regarded as a potential factor for swelling after mandibular third removal which will enable the surgeon to predict and counsel high risk patients in order to offer a preventive strategy. Results: Facial measurements were carried out on 1st, 2

... Show More
View Publication Preview PDF