Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Hydatid cystic or cystic echinococcosis disease remains a major challenge due to its medical and veterinary importance and its widespread spread all over the world as well as the economic losses caused by this disease, whether for humans or farm animals. Echinococcus granulosus is the causative agent for this disease, targeting the liver and lungs primarily and in varying proportions of the rest of the body. This disease is characterized by the non-appearance of pathological symptoms for long periods as its appearance depends on the size, number and site of the cysts formed and the type of organ infected and surgery is still the most effective solution for the disposal of hydatid cysts. Dogs and the rest of Canidae family represent the fina
... Show MoreOptimization of well placement plays a considerable role in the production and maximizing the net present value of the investment of oil field developments. However, the application of the optimization techniques in well placement developments is so complicated because many decision variables, objective functions, and constraints are involved in the well placement optimization case. Furthermore, many computational techniques; conventional and non-conventional, have been utilized to optimize well placement operations. This study displays the advancement of the optimization methods applied in the well placement. Subsequently, the study assorted the applied optimization methods, and it demonstrates the restriction and the range of implementati
... Show MoreGender mainstreaming is a goal for building a society characterized by justice and equality. Gender mainstreaming requires a clear understanding of the concept. Therefore, the research focuses on the concept of gender and how it was addressed in the literature through which the concepts related to gender were extracted which is represented by the role and social status through which the relationship of gender can be measured. In order to find out the basis for the different status and roles of both sexes in societies, the interpreted theories of gender were addressed, through which the most important factors affecting gender relations, such as biological, social and economic factors, as well as political systems, were discussed. Due to t
... Show MoreThis research aims to investigate the extent to which the Iraqi audience relies on interactive television programs as a source of information regarding national issues and their resulting impacts. It seeks to identify the types and nature of attitudes developed among the public towards national issues through these programs and determine the prominent topics and issues highlighted to the audience. The researcher employed a field survey as the primary research method, employing a questionnaire for data collection along with scientific observation and the Likert three-point scale to measure attitudes. The study was guided by the media dependency theory. A sample of 520 questionnaires was distributed to residents in
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain
... Show MoreBackground: The rapid evolution of Artificial Intelligence (AI) has significantly influenced Education, demonstrating substantial potential to transform traditional teaching and learning methods. AI reshapes teacher-student interactions and the relationship with knowledge. Objective: To analyze the potential benefits, ethical challenges, and limitations of AI in Education based on recent scientific literature, emphasizing the balance between technology and human interaction. Methods: A documentary research approach with a descriptive focus was employed, following the PRISMA protocol for systematic reviews. The search strategy involved analyzing evidence from 18 scientific articles published within the last six years. Results:AI o
... Show More