Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
Mathematics
The Impact of Fear on a Harvested Prey–Predator System with Disease in a Prey
...Show More Authors

A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Portugaliae Electrochimica Acta
A Kinetic Study of Oxalic Acid Electrochemical Oxidation on a Manganese Dioxide Rotating Cylinder Anode
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Experimental Investigation of Thermal Performance of a Solar Chimney Provided with a Porous Absorber Plate
...Show More Authors

 

Experimental investigation of the influence of inserting the metal foam to the solar chimney to induce natural ventilation are described and analyzed in this work. To carry out the experimental test, two identical solar chimneys (without insertion of metal foam and with insertion of metal foam) are designed and placed facing south with dimensions of length× width× air gap (2 m× 1 m× 0.2 m). Four incline angles are tested (20o,30o,45o,60o) for each chimney in Baghdad climate condition (33.3o latitude, 44.4o longitude) on October, November, December 2018. The solar chimney performance is investigated by experimentally recording absorber pl

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Education College Wasit University
“They’ve damaged your uniqueness”: Technology as a Source of Dystopia in Caryl Churchill’s A Number
...Show More Authors

This study focuses on the impact of technology on creating a dystopian world as presented by the English playwright Caryl Churchill in her play A Number (2002). This dramatic work came as a reaction to the most crucial and valuable turning point in the scientific achievements of human engineering, namely, the cloning of the sheep called Dolly. Therefore, A Number is a play that presents an analytical stage for imagining the biotechnological and scientific future. This dramatic vignette captures the playwright’s fears towards the abnormal progress of technology and science and how far such technological progress affects human relationships and identity. It also portrays how technological progress results in the feeling of a lack of

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
2nd International Conference On Materials Engineering & Science (iconmeas 2019)
A kinetic model for prodigiosin production by Serratia marcescens as a bio-colorant in bioreactor
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Crossref
Publication Date
Tue Jun 14 2022
Journal Name
Chemical Papers
Nile red based dye D–π–A as a promising material for solar cell applications
...Show More Authors

A recently reported Nile red (NR) dye conjugated with benzothiadiazole species paves the way for the development of novel organic-based sensitizers used in solar cells whose structures are susceptible to modifications. Thus, six novel NR structures were derived from two previously developed structures in laboratories. In this study, density functional theory (DFT) calculations and time-dependent DFT (TD-DFT) were used to determine the optoelectronic properties of the NR-derived moieties such as absorption spectra. Various linkers were investigated in an attempt to understand the impact of π-linkers on the optoelectronic properties. According to the findings, the presence of furan species led to the planarity of the molecule and a reduction

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Tue Jan 27 2026
Journal Name
Al–bahith Al–a'alami
Consumer attitudes towards the integrated marketing communications of the UAE Etisalat company: A study of a sample of its subscribers in the emirate of Abu Dhabi
...Show More Authors

The continuous technical development in the means of communication and information technologies has led to an increase in competition in the provision of service and product on the part of the organizations, as this competition does not know silence and stability on specific methods, but rather it is a world that is constantly moving and renewed in approaches, methods and approaches, and the focus of attention of integrated marketing communications practitioners are Customers, for them, organizations sell their goods, products, services, and ideas, and with them, they become stronger in competition.
This scientific study aimed to identify the trends of the initiators towards the integrated marketing communications of (the Emirates Tel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of The College Of Education For Women
Topic Management in Selected Dementia Patients' Speeches: A Clinical Discourse Analysis Study
...Show More Authors

Topic management is the awareness of how speakers deal with initiating, developing, changing, and ending a topic and how they fix the relationship when a misunderstanding occurs. It is such an important unit of conversation as it includes the transition from one strategy to the other to be accomplished in a systematic and orderly manner. These strategies are impaired in dementia patients thus lead to communication breakdown. This study aims at detecting the dementia patients' topic management strategies in selected speeches and answering the questions of which of these strategies are fully or partially detected in these speeches. The researchers use a qualitative method to examine the speeches of those patients and they adopt an eclectic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 15 2020
Journal Name
Al-academy
Dramatic Construction in Quranic Text Surah Taha – A model: جبار خماط حسن
...Show More Authors

There are many varied studies that dealt with the dramatic construction, especially books and studies that addressed drama in its construction and the method of writing it, that no textbook or a general cultural content is void of tackling the dramatic text in its construction and how the dramatic action develops in it. Therefore, a question occurs to the mind about the feasibility of dealing with the dramatic construction in this time, where many contemporary studies of dramatology and its relation and the contemporary critical directions are accumulating. This question many have two realistic aspects, yet the novelty and originality that this research shows lie in addressing a refined linguistic text in its style and connotations, such

... Show More
View Publication Preview PDF
Crossref (1)
Crossref