Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Iben Katheer Al Dimashqi is considered among the eminent scholars in the eighth Hijri century / fourteenth Gregorian century. He acquired eminent academic and social standing. His book Albidaya Walnihaya is considered among the important historical sources. This book's study of the subject of commercial dealing methods clarifies that the commercial dealing methods dealt by the people throughout the successive historical eras were multiple, most prominent of which was money (whether Dirhams, Dinars, measures (mikyals), weights (like Sa') in addition to other means like usury. But here we notice that Iben Katheer stressed that usury must be prohibited because it is religiously forbidden and cited many Quranic verses and Prophetic sayings w
... Show MoreIn the early 90s military operations and United Nations Special Commission “UNSCOM” teams have been destroyed the past Iraqi chemical program. Both operations led an extensive number of scattered remnants of contaminated areas. The quantities of hazardous materials, incomplete destructed materials, and toxic chemicals were sealed in two bunkers. Deficiency of appropriate destruction technology led to spreading the contamination around the storage site. This paper aims to introduce the environmental detection of the contamination in the storage site area using geospatial analysis technique. The environmental contamination level of nutrients and major ions such as sulphate (SO4), potassium (K), sodium (Na), magnesi
... Show Moreمنذ بداية نشوء المستشفيات كمنظمات تعنى بصحة الناس، عُرف الصراع (Conflict) بين جماعتي الإدارة والأطباء. وقد تركز محوره في معظم الأحيان حول سلطة أي منهما هي الأقوى في اتخاذ قرارات المستشفى.. هذا إذا ما علمنا أن كل من الطرفين المتعارضين يستمد قوته ويعزز مكانته من خلال سلطته في اتخاذ القرارات. إن جهود كلا الجماعتين الطبية والإدارية تصب في منهل واحد ألا وهو خدمة المريض والارتقاء بالمستوى الصحي ل
... Show MoreMobile Wireless sensor networks have acquired a great interest recently due to their capability to provide good solutions and low-priced in multiple fields. Internet of Things (IoT) connects different technologies such as sensing, communication, networking, and cloud computing. It can be used in monitoring, health care and smart cities. The most suitable infrastructure for IoT application is wireless sensor networks. One of the main defiance of WSNs is the power limitation of the sensor node. Clustering model is an actual way to eliminate the inspired power during the transmission of the sensed data to a central point called a Base Station (BS). In this paper, efficient clustering protocols are offered to prolong network lifetime. A kern
... Show MoreThe aim of the study is to investigate the extent to which the teachers of Islamic education and their teachers taught the technological innovations in the universities and to test the significance of the differences between the averages of the degree of practice according to the variables: gender, experience, scientific qualification, and educational stage. To achieve these objectives, a questionnaire consisting of (20) (20) teacher and school, teachers of Islamic education in Iraqi universities.
The results indicated that the degree of the practice of Islamic education teachers and their teachers of technological innovations was moderate, and there were statistically significant differences in the variable of
... Show MoreThis study was conducted in the Department of Employment and Loans at the Ministry of Labor and Social Affairs to indicate the importance and impact of both the empowerment and the functional flexibility in evaluating the performance of the employees. To achieve the objectives of the study, the data was collected through a questionnaire form designed for this purpose based on previous studies. Data obtained for a significant evaluation of the relationship between the components of both the empowerment and the functional flexibility with the components of the evaluation and determining the degree of importance of each component of both the empowerment and functional flexibility for the components of the evaluation by the extractio
... Show MoreFollowing the political development in Iraq Since 7112 exposed kind of political traditions about how to manage the conflicts that have different Iraqi powers .That what was clear since the formation of permanent government since in 7112 .
The case of conflict between political powers in administrating Iraq state and the withdrawal of American Forcesintroduces questions:
0-Is it possible that that the beginning of Iraq state building shall ease this conflict and peacemaking in the post-conflict period?
7- To what extent the Iraqi powerswas to manage their disputes in non-military like elections which was held in 7112?
2- What is the range of the extent of the political operation after the American withdrawal?
The important
It is not long time since globalization has started along with knowledge economy and, communication media and technical information control on the world. As a result serious events appeared like failure in businesses, financial corruption and shortage of administration and control.
In spite of the great efforts held by international organizations and foundations to find organizational frames that adopt independence, que
... Show Moreيعد التحليل البلاغي تركيبيا وبيانيا من الآليات الكاشفة عن الدلالات العميقة المتولّدة جراء علاقات البنية السطحية ، مكونة نسقاً دلالياً متماسكاً ومشحوناً بتكثيف معنوي للصور البلاغية المنسوجة في نص القصيدة، والتي تفتح للمتلقي نافذة التشكيل المتخيل لحال الشعب وحاكمه ، والعلاقة القائمة بينهما في القصيدة ، إذ نسج الشاعر علائقية متنامية الدلالة بين أجزاء قصيدته ووحداتها ؛ لتكون كلاً واحداً ناقلاً المتلقي لواق
... Show More