Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 21 2018
Journal Name
Al–bahith Al–a'alami
Remediation of the Administrative Corruption Issues in accordance to the Theory of News Frames
...Show More Authors

Media, especially press plays an important role in fighting corruption and tackling this phenomenon, which has become widespread in our society, through its effective role in raising awareness of the seriousness of spreading of corruption of all its forms in society.
All international conventions and agreements stress the necessity of the role of media and its importance in the light of corruption. All countries also commit themselves to the necessity of guaranteeing the freedom of media and the circulation of information and preparing it as a prerequisite for activating the People’s Control Mechanism and supporting measures and means to prevent and combat financial and administrative corruption more actively and effectively.
Co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Dental And Medical Problems
Effect of the local application of bupivacaine in early pain control following impacted mandibular third molar surgery: A randomized controlled study
...Show More Authors

Background: Postoperative pain is one of the main complications following impacted mandibular third molar (IMTM) surgery. Objectives: The aim of this study was to assess the effect of the local application of bupivacaine on reducing early postoperative pain following IMTM surgery. Material and methods: A prospective, single-blinded, randomized controlled study was conducted on 40 patients who had undergone the surgical removal of an IMTM under local anesthesia. In the study group (n = 20), absorbable gelatin sponge (AGS) soaked in 3 mL of 0.5% plain bupivacaine hydrochloride was locally applied in the post-extraction socket. In the control group (n = 20), AGS soaked in 3 mL of normal saline was used. Pain intensity was assessed using a pa

... Show More
View Publication
Scopus (10)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Sun Oct 26 2025
Journal Name
Journal Of Contemporary Medical Sciences
Comparative Evaluation of Early Pregnancy Outcomes Following Ovulation Induction with Letrozole Versus Clomiphene Citrate: Evidence from a Prospective Iraqi Cohort Study
...Show More Authors

Objectives: To compare early pregnancy outcomes, including miscarriage, ectopic pregnancy, multiple pregnancy, and congenital anomalies, among women who conceived following ovulation induction with letrozole or clomiphene citrate. Methods: A prospective comparative observational study was conducted at Al-Elwiya Maternity Teaching Hospital and a private clinic in Baghdad, Iraq, from March 2023 to December 2024. One hundred infertile women aged 21–35 years who conceived after ovulation induction with either letrozole (5 mg/day) or clomiphene citrate (100 mg/day) for five days (cycle days 3–7) were enrolled. Participants were followed through early pregnancy with serial sonography at 6, 8–11, and 18–20 weeks of gestation. Data

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Predicting Social Security Fund compensation in Iraq using ARMAX Model
...Show More Authors

Time series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Wed Dec 31 2025
Journal Name
Al–bahith Al–a'alami
The Media Discourse of the Newspaper (El Watan) Towards Social Issues Study in Discourse Analysis
...Show More Authors

Journalistic discourse is a fertile through which most of the segments of the society interact in all their platforms: intellectual, cultural, social, and various settings between the vital structures of the state; which makes it the link between the groups and segments of the society.

The role of discourse, moreover, engages in a vital way by establishing a culture of debate on controversial issues that provided a space in the different visions and differing perceptions on how to formulate the discourse and the magnitude of vocabulary for the diagnosis of these issues. Since there is no system of any community empty of the emergence of issues reflecting the public interest which is necessary is reflected in the context discourse

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Effect of Nursing Educational Program on Recovery Following CABG Surgery: Intervention Study
...Show More Authors

This intervention study is composed on 55 patients at Saddam Center for Cardiac Surgery (Aben-Albetar) throughout the period from 1st of July 1997 to 15th of January 1999. The study aimed to evaluate the effectiveness of constructed nursing education program on reduction of complications and improving recovery among patients with Coronary Artery Bypass Graft (CABG) surgery through the application of repeated measures. The sample is divided into 27 patients who received the nursing educational program (study group) and 28 patients who continued to receive regular care (controls). Based on previous research meth

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 30 2007
Journal Name
Al-kindy College Medical Journal
Lower Ureteral Obstruction and Leakage in the First Month Following Renal Transplantation
...Show More Authors

Background: Transplantation has revolutionized
treatment of end- stage renal disease (ESRD) by proving
more cost effective than hemodialysis, with a lower
morbidity and improved quality of life.
Objective: To evaluate the development of these
complications in the first month postoperatively and
correlate their development to the type of donation
whether related or unrelated.
Methods: Fifty (50) patients aged (15-62) years, with a
mean age (34.46 ± 12.4 SD) years with (ESRD), who
underwent renal transplantation from September 2000 to
October 2002, were followed-up for one month
postoperatively clinically and by assessment of renal
function tests, sonographic and Doppler examinations.
Ureteral obs

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
New Irrigation Techniques for Precision Agriculture: A Review
...Show More Authors

Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us

... Show More
Preview PDF