Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Apr 18 2023
Journal Name
Electronics
A Systematic Approach to Stable Grasping of a Two-Finger Robotic Hand Activated by Jamming of Granular Media
...Show More Authors

A systematic approach is presented to achieve the stable grasping of objects through a two-finger robotic hand, in which each finger cavity was filled with granular media. The compaction of the latter, controlled by vacuum pressure, was used to adjust the structural and contact stiffness of the finger. The grasping stability was studied under the concurrent effect of an external torque and applied vacuum pressure. Stable grasping was defined as the no slippage condition between the grasped object and the two fingers. Three control schemes were adopted and applied experimentally to ensure the effectiveness of the grasping process. The results showed that stable and unstable grasping regions exist for each combination of applied torqu

... Show More
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Sep 18 2018
Journal Name
Water
A Systematic Operation Program of a Hydropower Plant Based on Minimizing the Principal Stress: Haditha Dam Case Study
...Show More Authors

Dam operation and management have become more complex recently because of the need for considering hydraulic structure sustainability and environmental protect on. An Earthfill dam that includes a powerhouse system is considered as a significant multipurpose hydraulic structure. Understanding the effects of running hydropower plant turbines on the dam body is one of the major safety concerns for earthfill dams. In this research, dynamic analysis of earthfill dam, integrated with a hydropower plant system containing six vertical Kaplan turbines (i.e., Haditha dam), is investigated. In the first stage of the study, ANSYS-CFX was used to represent one vertical Kaplan turbine unit by designing a three-dimensional (3-D) finite element (F

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Methodology of the concept of sovereignty in contemporary Islamic thought
...Show More Authors

The methodology of the concept of sovereignty in contemporary Islamic thought

View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Industrial Property Licensing Contracts are Exempted from Ban in Accordance with USA and European Law
...Show More Authors

Intellectual property rights of all kinds، and their nature، are considered a tool in the hands of their owner that enables him to monopolize the benefits that you confer on them without any dispute or mediation from anyone. Intellectual property on its intellectual product، and preventing others from exploiting it without obtaining the permission of its owner All of this is reflected positively on the progress of the industrial and commercial field، and this justifies the protection provided by the laws regulating intellectual property rights to its owner، whether at the national or international level، and with our recognition of the right of the owner of intellectual property rights to enjoy the exclusive use of his right، and

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 03 2023
Journal Name
College Of Islamic Sciences
A critical methodological study in abrogative,abrogated, in a book of (Zad AlTafseer) in Surah Al-Baqara in the holy Quraan.
...Show More Authors

This research is a critical methodological  study deals with some Quranic verses abrogative,abrogated.

by Ibn al-Jawzi (may Allah have mercy on him) in his book (Tafseer Zad al-Maseer) inin Surah Al-Baqara the  in the holy Quraan.

View Publication Preview PDF
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
News Processing of Corruption Issues in Iraq Satellite Channels
...Show More Authors

The core idea of this study revolves around the news coverage by Iraqi satellite channels regarding corruption issues and their implications on the public's perception of the political process. The researcher designed a content analysis form encompassing both primary and sub-categories of news bulletins from the channels, Dijlah and Al-Itijah, spanning from 01/06/2021 to 31/08/2021, using a comprehensive enumeration method. The chosen timeframe preceded the parliamentary elections held in October 2021. Employing a descriptive-analytical approach coupled with observation, the researcher derived results that met the study's objectives. Among these findings, news items enhanced with video content topped the categorie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2009
Journal Name
Tencon 2009 - 2009 Ieee Region 10 Conference
Optimizing the MPLS support for real time IPv6-Flows using MPLS-PHS approach
...Show More Authors

View Publication
Scopus (4)
Scopus Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Tue May 16 2023
Journal Name
Political Sciences Journal
(The role of the Security Council in Managing international crises (The Libyan crisis as a model
...Show More Authors

The Security Council has an active role in addressing international crises and dealing with their causes. The Libyan crisis is one of the most important real tests of the Security Council and its role in maintaining international peace and security, as the Council has proven so far an ineffective role in resolving the crisis and dealing withtheir causes, which has prolonged its duration and increased its complexities and dangerous repercussions, perhaps the most prominent of which is the threat of the recently achieved cease-fire and the formation of a new transitional government led by Abdel Hamid al-Dabaiba, the growing significant obstacles facing the political process, foremost of which is the continued presence of foreign forces , m

... Show More
View Publication Preview PDF
Crossref