Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of platelet rich-fibrin on alveolar osteitis incidence following surgical removal of impacted mandibular third molars: A comparative study
...Show More Authors

Background: Postoperative morbidity after extraction of the impacted mandibular third molar (IMTM) is inevitable. One of the most common postoperative complication is alveolar osteitis (AO) which is a painful non healed socket. Many researches were attempted to prevent the occurrence of AO by introducing and applying a new materials inside the extraction socket. Platelet rich fibrin (PRF) is a biological complex fibrin matrix where autologous platelets and leucocytes are present, used to enhance tissue healing process and reduce the early adverse effects of the inflammation. Aims: To evaluate the effect of PRF on the incidence of AO. Also to assess PRF effect on pain, swelling, and trismus following the surgical removal of IMTM and

... Show More
View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Journal Of Information And Communication Convergence Engineering
Survey on Physical Layer Security in Downlink Networks
...Show More Authors

In this paper, we discuss physical layer security techniques in downlink networks, including eavesdroppers. The main objective of using physical layer security is delivering a perfectly secure message from a transmitter to an intended receiver in the presence of passive or active eavesdroppers who are trying to wiretap the information or disturb the network stability. In downlink networks, based on the random feature of channels to terminals, opportunistic user scheduling can be exploited as an additional tool for enhancing physical layer security. We introduce user scheduling strategies and discuss the corresponding performances according to different levels of channel state information (CSI) at the base station (BS). We show that the avai

... Show More
Preview PDF
Scopus (7)
Scopus
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Sep 29 2021
Journal Name
College Of Islamic Sciences
Methodology of the Holy Quran Immunizing the minds of intellectuals against intellectual invasion
...Show More Authors

 

Abstract

              

The Holy Quran is the greatest motivator for the mind to keep pace with life. The doctrine of faith is a requirement of logic and wisdom, and it cannot be reached by the hand of superstition. The Qur’an destroyed the principle of superstition in the verses of the creation of the universe. The principle of inactivity of the Qur’an is a false accusation that collision with the texts of the Qur’an. The secret of scientific development is to harness the laws of nature, benefit from them, and walk according to its requirements, on which the manifestations of civilization and the Qur’an are based

... Show More
View Publication Preview PDF
Publication Date
Fri May 15 2026
Journal Name
Al–bahith Al–a'alami
The problem of defining the vocabulary of teaching Arabic language methodology in media colleges
...Show More Authors

This study examined the problem of identifying the vocabulary of the methodology of teaching Arabic language in the faculties of Media. The researcher noticed the existence of an overlap between the syllabuses of the general specialization of the Arabic language and its Media sections in the universities with the special professional vocabulary that suits the study of the media student. Thus ,this study is regarded as a real attempt to present a methodological model of media language that concerns with fillfuling students ‘linguistic and knowledgeable needs relying on measuring their benefits from the methodological Arabic curriculum .  Key words:problem,  teaching’ methodology of Arabic language, media language.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2010
Journal Name
Journal Of Educational And Psychological Researches
The Academic and Practical Frames to The roles Of Systematic Education in the Social and Economic development
...Show More Authors

Education in it s different levels becomes development in any country. There fore, nations pay great attention to educational systems, because they perceive that preparing human resources is essential to the development of these nations.
The present study deals with the a academic frames which formulate education in each educational system such as educational philosophy , educational aims , educational strategies by which the academic frames are carried out, which is limited to curriculum, teacher preparations, school activities, in addition to guidance and counseling.
This study reaches some conclusion which are derived from the description of the academic and practical frames some suggestion are made for the mechanism which facil

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Journal Of Political Science
Terrorist organizations employ technological development to threaten international security and stability
...Show More Authors

Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,

... Show More
View Publication
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Psychological Security of Students in the Kindergarten Department
...Show More Authors

Abstract

The current research aims to identify the psychological security of students in the kindergarten department and identify if there is a significant difference between stage one and stage four students. To do this, the researcher adopted the psychological research scale of (Al-mohamdawi, 2007) that consisted of (30) items. It was administered to (120) female students chosen randomly from the kindergarten department in the college of education for women for the academic year (2029-2021). The results revealed that students in the kindergarten department have psychological security. There is a significant difference between stage one and four students in favor of stage four students.

View Publication Preview PDF
Publication Date
Sun Oct 06 2013
Journal Name
Journal Of Educational And Psychological Researches
Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history
...Show More Authors

Following model educational offenders in collection and Alasbaka of fifth grade students preparatory in history A. M. Dr Prepared by: Dr. Bashaer Mawloud Tawfeeq, The Center of Educational and Psychological Studies Baghdad University - There is no difference statistically significant at the 0.05 level of significance between the average scores of the following students studying using model and offenders and who are studying in the usual manner (traditional) in the collection - There is no difference statistically significant at the 0.05 level of significance between the mean scores for the following students studying using model and offenders and who are studying in the usual manner (traditional) in retention Find limits: Current search

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
The Kurdistan Workers Party (PKK) and its Impact on Iraqi National Security
...Show More Authors

The Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar  after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued

... Show More
View Publication Preview PDF
Crossref