Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
With the twenty - First century, It becomes clear to us that for 110 years the Japanese - Chinese relations have been witnessing big radical events and developments. ( we take the year of 1949 as the starting date for this relations). In order to prove hypothesis the study divided in to four chapters. - The first chapter deals with explaining the factors of the subject of the Japanese - Chinese relations which described as Indirect threat and aggressive relations from Japan to China after the Second World War by Japanese entering in the American world strategy, in order to destroy the communist china's system which decleard in 1949, because the united states understood that the new system in Beijing could threat American's Interest
... Show MoreIn this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.
The digital revolution had greatly affected the methods through which we communicate, starting from the basic concepts of the internet technology and the web content in addition to the important issues that concern the culture of the digital media, the internet governance and the variation in the digital age in general and the graphic and internal design in particular.
This research addresses an important topic that goes along with the scientific development in the field of the digital design, especially in the internal and graphic designs. This study consists of two sections: the first includes the problem of the study and the need for it. Starting from the problem of the research, there is no clear perception of the formal characte
Laser etching may be an alternative to acid etching of enamel and dentin. Several characteristics of irradiated dental hard tissues have been considered advantageous, microscopically rough surfaces without demineralization, open dentinal tubules without smear layer production and dentin surface sterilization. The aim of this study is to determine and compare histology the microleakage in class V cavity restored with a light cured composite after conditioning the samples(tooth surface) with 1-acid etching, 2-Q-switched Nd:YAG Laser etching and finally 3- acid and laser etching. Materials and methods: Twenty four non carious human extracted teeth were used in this study. The samples were equally grouped into four groups of six teeth each.
... Show MoreBehavioral and emotional disorders represent one of the commonest problems facing children in particular and disturbing their parents and educators in general. This is because Iraqi people have long been living in difficult conditions and faced various terrorists’ operations, such as killing, destruction, robbery, and looting. Such operations are said to be one of the reasons that leads to the development of such disorders, and may negatively affect the psyche of the child and be reflected on his behavior as represented by playing with the IPad for hours, and suffering from nightmares. Accordingly, the current research aims to examine specifically the commonest negative behavioral disorders among kindergarten children during the post-t
... Show MoreResearch questions start from the fact that what the Arab origins of education indicted . First question are :
- To what extent the subject of assets acquired a specific meaning in the Arabic books and educational subjects ? Is these selections are reflected on the classification of assets and their types ?
- What’s the nature of the content ? .Is there a consistency between the meaning and content ?
- What entrances handling and curriculum approach and tactics are in those books ?
- Is the assets subject introduced within the grade best suited ?
&nb
... Show MoreThis research aimed to evaluate the level of readiness to teach science in the light of the information, media, and technology skills among undergraduate students at the Faculty of Edu-cation, King Khalid University. To achieve this goal, a descriptive and analytical approach was used. A list of readiness to teach science was prepared in the light of Information, media, and technology skills, and in the light of this list, a cognitive test, observation sheet, and attitude scale were prepared to assess readiness to teach science in its three aspects, cognitive, behavioral, and emotional. The sample of the research consisted of (42) students enrolled in field training courses at the sixth, seventh and eighth levels. Research tools were app
... Show Moreيهدف هذا البحث إلى تأصيل الإستدلال بالقاعدة العقائدية، وبيان ضوابطه، وإبراز نماذج من أهم تطبيقاته المعاصرة، وقد أعتمد مناهج من أهمها المنهج الإستقرائي والمنهج المقارن ، وتناول البحث التعريف لقصص النبوة فى الأديان السماوية ، وعرض بعض الدراسات السابقة التى تناولت نفس الموضوع ، ثم تطرق البحث لذكر نماذج من قصص الأنبياء من الديانات السماوية الثلاث ، وتوصل البحث الى أن الأديان السماوية رغم بعض الإختلاف
... Show Moreتهدف الدراسة الحالية الى استعمال الانموذج اللوجستي ثنائي المعلم في تدريج مقياس الشخصية الافتراضية المتعدد الابعاد لطلبة الجامعة وفقا لنظرية الاستجابة للفقرة، والخروج بتعميم لنتائج البحث والوقوف على الاجراءات العلمية المناسبة وتوفير تطبيق عملي علمي صحيح لاعتمادها من قبل الباحثين. وقد اتبعث الباحثة الاسلوب العلمي من خطوات واجراءات في عملية بناء المقياس حيث حدت ابعاد الشخصية الافتراضية المتمثلة بسبع ابعا
... Show MoreThe study aims to examine the estimation of a sample of Palestinian University students in Gaza governorate to the contribution of teaching human sciences in their political education. It further aims to reveal whether there are statistically significant differences at a significance level (α≤ 0.05) between the averages of the sample. Such differences might be attributed to the following variables: sex, residential area, specialization. To achieve this, the researcher used the descriptive approach by applying a tool of (50) items on (618) randomly chosen male and female students from the largest Palestinian universities in the governorates of Gaza. Results have shown that: the overall degree of estimation to the contribution of teachi
... Show More