Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show MoreThis study was designed to evaluate the effect of major surgery on thyroid hormones and thyrotropin in patient undergoing major lower abdominal surgery. The study included fifty patients scheduled for elective major lower abdominal surgery, the serum levels of T3, T4 and TSH were determined one day preoperatively, intraoperative, one day postoperatively, two days postoperatively, and rT3 was determined one day preoperatively, and one day postoperatively. We observed that the levels of (T3, T4, TSH) increased significantly (P<0.05) intraoperatively, one day postoperatively the levels of T3 and T4 reduced significantly (P<0.05), while TSH reduced not significantly (P>0.05), and two days postoperatively T4 and TSH returned to increase si
... Show MoreCefixime (CFX) was treated with sodium nitrite and hydrochloric acid for diazotization reaction followed by coupling with ?-Naphthol in alkaline medium to form, a yellow colored azo dye compound which exhibits maximum absorption (?max) at 412 nm where the concentration of (CFX) was determined spectrophotometrically. The optimum reaction conditions and other analytical parameters were evaluated. Beer’s law was obeyed in the concentration range of (1-20) ?g.mL-1 with a molar absorptivity of 34870.5 L.mol-1.cm-1. The limit of detection was found to be 0.1090 ?g.mL-1 and the Sandell's sensitivity value was 0.0130 ?g.cm-2. The proposed method could be successfully applied to
... Show MoreObjectives: To evaluate the incidence of adhesions
induced intestinal obstruction after explorative laparotomy
due to bullet/shell injury in Al-Kindi teaching
hospital/Baghdad.
Results: Thirty-six out of the 76 cases with adhesions
induced intestinal obstruction (A.I.I.O.) had history of
laparotomy for penetrating missile injury, 26 of them were
explored as a method of management of A.I.I.O. with
mean age (22 for those explored, ٣٧ for those treated
conservatively), 16 of them presented within a year or less
from the previous surgery.
Methods: Comparative interventional prospective study of
cases with adhesions induced intestinal obstruction
admitted to the surgical wards in Al-Kindi teaching
h
Background: Postoperative morbidity after extraction of the impacted mandibular third molar (IMTM) is inevitable. One of the most common postoperative complication is alveolar osteitis (AO) which is a painful non healed socket. Many researches were attempted to prevent the occurrence of AO by introducing and applying a new materials inside the extraction socket. Platelet rich fibrin (PRF) is a biological complex fibrin matrix where autologous platelets and leucocytes are present, used to enhance tissue healing process and reduce the early adverse effects of the inflammation. Aims: To evaluate the effect of PRF on the incidence of AO. Also to assess PRF effect on pain, swelling, and trismus following the surgical removal of IMTM and
... Show MoreBackground: Postoperative morbidity after extraction of the impacted mandibular third molar (IMTM) is inevitable. One of the most common postoperative complication is alveolar osteitis (AO) which is a painful non healed socket. Many researches were attempted to prevent the occurrence of AO by introducing and applying a new materials inside the extraction socket. Platelet rich fibrin (PRF) is a biological complex fibrin matrix where autologous platelets and leucocytes are present, used to enhance tissue healing process and reduce the early adverse effects of the inflammation. Aims: To evaluate the effect of PRF on the incidence of AO. Also to assess PRF effect on pain, swelling, and trismus following the surgical removal of IMTM and compa
... Show MoreAbstract
The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.
This paper addresses the nature of Spatial Data Infrastructure (SDI), considered as one of the most important concepts to ensure effective functioning in a modern society. It comprises a set of continually developing methods and procedures providing the geospatial base supporting a country’s governmental, environmental, economic, and social activities. In general, the SDI framework consists of the integration of various elements including standards, policies, networks, data, and end users and application areas. The transformation of previously paper-based map data into a digital format, the emergence of GIS, and the Internet and a host of online applications (e.g., environmental impact analysis, navigation, applications of VGI dat
... Show MoreThe research aimed to study the role that the media play in shaping the public knowledge of human rights issues among the people of Kirkuk, which will be the focus of the study. The research was conducted by applying a survey panel to a random sample of the city's audience. The research dealt with the theoretical aspect of a theory that relied on the media, and the loans provided by the theory, on the basis of which the research was conducted and the research problem was determined based on a major question: What is the role that the mass media play in developing the knowledge of members of the public on human rights and the relationship between the intensity of view in that, as well as the identification of the effect of two variables G
... Show MoreThe increasing complexity of assaults necessitates the use of innovative intrusion detection systems (IDS) to safeguard critical assets and data. There is a higher risk of cyberattacks like data breaches and unauthorised access since cloud services have been used more frequently. The project's goal is to find out how Artificial Intelligence (AI) could enhance the IDS's ability to identify and classify network traffic and identify anomalous activities. Online dangers could be identified with IDS. An intrusion detection system, or IDS, is required to keep networks secure. We must create efficient IDS for the cloud platform as well, since it is constantly growing and permeating more aspects of our daily life. However, using standard intrusion
... Show More