Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
In this study, from a total of 856 mastitis cases in lactating ewes, only 34 Streptococcus agalactiae isolates showed various types of resistance to three types of antibiotics (Penicillin, Erythromycin and Tetracycline). St. agalactiae isolates were identified according to the standard methods, including a new suggested technique called specific Chromogenic agar. It was found that antibiotic bacterial resistance was clearly identified by using MIC-microplate assay (dilution method). Also, by real-time PCR technique, it was determined that there were three antibiotics genes resistance ( pbp2b, tetO and mefA ). The high percentage of isolate carried of a single gene which was the Tetracycline (20.59%) followed by percentage Penicillin was
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreRationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe rapid developmemt of information technology and its use in all fields has a bositive influence on all fields , and financial markets have a share of this development through the use of an electronic trading system to settle transactions and enhance transparency and disclosure in all activities of these markets and stimulate their performance .
It is worth nothing that these revolutions remove the necessity for nonstop connection with persons through the internet or phone networks , novel knowledge decreases the charges of structure original transaction system and reducing the fences of new participants entry .
The development in transportations expertise allows for quicker or
... Show Moreلقد توسعت وتطورت انشطة منشآت الاعمال بشكل كبير، وقد تمكنت المحاسبة من التعامل مع هذا التطور من خلال ايجاد المعالجات المحاسبية التي تتوافق مع خصوصية هذه المنشآت وطبيعة انشطتها، وقد ادى مجلس معايير المحاسبة الدولية دوراً مهماً في تحقيق توافق المعالجات المحاسبية في غالبية دول العالم مع المنطق الذي يحمله الفكر المحاسبي.
في الربع الاخير من القرن الماضي ظهرت منشآت ذات خصوصية معينة يس
... Show MoreAbstract
This research deals with the technical of opening text during the critical
study about the poem of Al- ssiyab which is named ( city with out rain)
We chose this poem also to make connection with the western critical
theories.
Our study aims to explain the act of opening texts and critics and its
methods and directions in modern Arabic poetry.
It also aims to show the differences in the point of view between critics
and poetries.
The research depends on dimension vision of selective, and descriptive.
The developed financial system is essential for increasing economic growth and poverty reduction in the world. The financial development helps in poverty reduction indirectly via intermediate channel which is the economic growth. The financial development enhancing economic development through mobilization of savings and channel them to the most efficient uses with higher economic and social returns. In addition, the economic growth reduces the poverty through two channels. The first is direct by increasing the introduction factors held by poor and improve the situations into the sectors and areas where the poor live. The second is indirect through redistribution the realized incomes from the economic growth as well as the realiz
... Show MoreActivity test of the inhibitors purified from barley and broad beans crop proved the inhibition activity against 6 types of rots Pencillium ssp and Aspergellusflavus and Aspergillus niger and Fusarium solani and Fusarium semitectum and Mucor with three concentrations 0.1 and 0.2 and 0.3 mg/ml, where the inhibitor purified from the second peak of broad beans proved that it had a higher inhibition activity against the growth of test rots which were 53.75 and 62.5 and 78.5 and 76.25 and 84 and 18.8% respectively, at 0.3 mg/ ml followed by the first peak of the inhibitor purified from broad beans the inhibition activity were 43.75 and 50 and 62.96 and 75 and 80 and 12.5 then the inhibitor purified from barley in which the inhibition activity
... Show MoreIraq within the ranks of the fledgling communities characterized by a broad base of the population pyramid, because they pose the age group (under 15 years) of a large proportion of the community, as it exceeded the proportion (40%) during the years of research extended (1986-2010) Despite the relative decline in the rates fertility during that period, but the proportion of young people remained high, especially for groups of at least five years, amounting to about 14% in 2012, a little more than the proportion of what constitutes age group (5-9 above) years, where it was (13%) and this naturally predicts continuing population increases in coming decades, due to the entry of those numbers of individuals in the reproductive stage,
... Show More