Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Media, especially press plays an important role in fighting corruption and tackling this phenomenon, which has become widespread in our society, through its effective role in raising awareness of the seriousness of spreading of corruption of all its forms in society.
All international conventions and agreements stress the necessity of the role of media and its importance in the light of corruption. All countries also commit themselves to the necessity of guaranteeing the freedom of media and the circulation of information and preparing it as a prerequisite for activating the People’s Control Mechanism and supporting measures and means to prevent and combat financial and administrative corruption more actively and effectively.
Co
Background: Postoperative pain is one of the main complications following impacted mandibular third molar (IMTM) surgery. Objectives: The aim of this study was to assess the effect of the local application of bupivacaine on reducing early postoperative pain following IMTM surgery. Material and methods: A prospective, single-blinded, randomized controlled study was conducted on 40 patients who had undergone the surgical removal of an IMTM under local anesthesia. In the study group (n = 20), absorbable gelatin sponge (AGS) soaked in 3 mL of 0.5% plain bupivacaine hydrochloride was locally applied in the post-extraction socket. In the control group (n = 20), AGS soaked in 3 mL of normal saline was used. Pain intensity was assessed using a pa
... Show MoreObjectives: To compare early pregnancy outcomes, including miscarriage, ectopic pregnancy, multiple pregnancy, and congenital anomalies, among women who conceived following ovulation induction with letrozole or clomiphene citrate. Methods: A prospective comparative observational study was conducted at Al-Elwiya Maternity Teaching Hospital and a private clinic in Baghdad, Iraq, from March 2023 to December 2024. One hundred infertile women aged 21–35 years who conceived after ovulation induction with either letrozole (5 mg/day) or clomiphene citrate (100 mg/day) for five days (cycle days 3–7) were enrolled. Participants were followed through early pregnancy with serial sonography at 6, 8–11, and 18–20 weeks of gestation. Data
... Show MoreTime series have gained great importance and have been applied in a manner in the economic, financial, health and social fields and used in the analysis through studying the changes and forecasting the future of the phenomenon. One of the most important models of the black box is the "ARMAX" model, which is a mixed model consisting of self-regression with moving averages with external inputs. It consists of several stages, namely determining the rank of the model and the process of estimating the parameters of the model and then the prediction process to know the amount of compensation granted to workers in the future in order to fulfil the future obligations of the Fund. , And using the regular least squares method and the frequ
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show MoreJournalistic discourse is a fertile through which most of the segments of the society interact in all their platforms: intellectual, cultural, social, and various settings between the vital structures of the state; which makes it the link between the groups and segments of the society.
The role of discourse, moreover, engages in a vital way by establishing a culture of debate on controversial issues that provided a space in the different visions and differing perceptions on how to formulate the discourse and the magnitude of vocabulary for the diagnosis of these issues. Since there is no system of any community empty of the emergence of issues reflecting the public interest which is necessary is reflected in the context discourse
... Show MoreThis intervention study is composed on 55 patients at Saddam Center for Cardiac Surgery (Aben-Albetar) throughout the period from 1st of July 1997 to 15th of January 1999. The study aimed to evaluate the effectiveness of constructed nursing education program on reduction of complications and improving recovery among patients with Coronary Artery Bypass Graft (CABG) surgery through the application of repeated measures. The sample is divided into 27 patients who received the nursing educational program (study group) and 28 patients who continued to receive regular care (controls). Based on previous research meth
Background: Transplantation has revolutionized
treatment of end- stage renal disease (ESRD) by proving
more cost effective than hemodialysis, with a lower
morbidity and improved quality of life.
Objective: To evaluate the development of these
complications in the first month postoperatively and
correlate their development to the type of donation
whether related or unrelated.
Methods: Fifty (50) patients aged (15-62) years, with a
mean age (34.46 ± 12.4 SD) years with (ESRD), who
underwent renal transplantation from September 2000 to
October 2002, were followed-up for one month
postoperatively clinically and by assessment of renal
function tests, sonographic and Doppler examinations.
Ureteral obs
Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us
... Show More