Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of t
... Show MoreThis study attempts to address the importance of communicative digitization in the field of various arts for the sake of continuity of shopping and aesthetic, artistic and intellectual appreciation of artistic achievements by the recipient on various places of their residence in light of the COVID 19 crisis, and to highlight the importance of the plastic arts of the Iraqi painter exclusively and how it expresses in a contemporary way the environment or life reality in Iraq in light of this crisis. With all its implications affecting the life reality from various aspects and methods of its negative and positive employment. As for the research procedures, the researcher reviewed the research methodology represented by the descriptive ana
... Show MoreBackground: Corona virus disease 2019 (COVID-19) is a communicable disease caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). It was first identified in December 2019 in Wuhan, China, and has since spread globally, leading to an ongoing pandemic.
Aim of study: to review the clinical, lab investigation and imaging techniques, in pediatric age group affected COVID-19 to help medical experts better understand and supply timely diagnosis and treatment.
Subjects and methods: this study is a retrospective descriptive clinical study. The medical records of patients were analyzed. Information’s recorded include demographic data, exposure history, symptoms, signs, laboratory findin
... Show MoreObjectives: Assessment of glycodelin (GD) as a marker for unruptured ectopic pregnancy (EP) in the first trimester of pregnancy. Materials and Methods: This case-control study was conducted during June 2016 to May 2017 in the Obstetrics and Gynecological Department of Baghdad University at Baghdad teaching hospital/medical city complex. In this study, 100 pregnant women in their first trimester of pregnancy were included after clinical and ultrasonic findings. Results: Based on the results, GD levels in EP were significantly lower than those with normal intrauterine pregnancy (1.58 ± 1.18 vs. 30.1 ± 11.9). In addition, using receiver operator curve analysis, the cut-off GD level of 9.5 and less had acceptable validity results (100
... Show MoreTo find out the impact of maternal risk factors on the outcome of pregnancy in Baghdad city. A descriptive purposive study was carried out on 100 postpartum women who had delivered for 1 hr. to 24 hrs. ago . the study sample was selected from three hospitals in Baghdad city ( Baghdad teaching hospital ,Fatima Al-Zahra'a maternity and pediatric teaching hospital and Al-Yarmook teaching hospital),during the period from 25 Jan. to 25 Feb. 2006. The data were collected through the use of questionnaire format reviewing pregnants' records and personal interview and were analyzed by using descriptive and inferential statistical approaches. The finding revealed that maternal pregnancy complications had weak effects on pregnancy outcome , while mate
... Show MoreThe recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approach
... Show More