Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Zernike Moments has been popularly used in many shape-based image retrieval studies due to its powerful shape representation. However its strength and weaknesses have not been clearly highlighted in the previous studies. Thus, its powerful shape representation could not be fully utilized. In this paper, a method to fully capture the shape representation properties of Zernike Moments is implemented and tested on a single object for binary and grey level images. The proposed method works by determining the boundary of the shape object and then resizing the object shape to the boundary of the image. Three case studies were made. Case 1 is the Zernike Moments implementation on the original shape object image. In Case 2, the centroid of the s
... Show MoreMR Younus…, 2020 - Cited by 2
A Factorial Study for separation anxiety in students, of Baghdad City
Autonomous systems are these systems which power themselves from the available ambient energies in addition to their duties. In the next few years, autonomous systems will pervade society and they will find their ways into different applications related to health, security, comfort and entertainment. Piezoelectric harvesters are possible energy converters which can be used to convert the available ambient vibration energy into electrical energy. In this contribution, an energy harvesting cantilever array with magnetic tuning including three piezoelectric bimorphs is investigated theoretically and experimentally. Other than harvester designs proposed before, this array is easy to manufacture and insensitive to manufacturi
... Show MoreThe Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr
Background: Fiber-optic endoscopy is an important
investigation of the large intestine, whether or not the
radiologist (barium enema) has discovered a lesion in
the bowel. Colonoscopy affords a unique opportunity
to direct visualization of entire colonic mucosa. At
the same time, the physician can obtain biopsy specimens, remove polyps, and decompress volvuli.
Most experienced endoscopists and well prepared
patients can reach the cecum in over 90% of patients.
If colonoscopy is properly performed, it has a low
risk of complications, such as perforation and bleeding.
Methods: A total of 70 consecutive patients admitted
to Endoscopy department at Al-Kindy Teaching hospital from September- 2008 to July-2009.
A field experiment was conducted on the form of the Dept. of Field Crop Sci. / College of Agriculture / University of Baghdad in spring and fall seasons of 2009 and 2010 . Ten inbreds of maize were planted and crossed to each other to produce single crosses . In the second season, single crosses were planted along with thin parent to produce three – way and double crosses . In the third seasons panet and crosses were planted . Crosses were selfed to produce F2 seeds and increase seeds of inbreds . In the fourth season, all grin types were planted , and their agronomic traits were evaluated . Values of P of inbreds , F1 and F2 were calculated for agronomic traits . The new formula to predict inbreeding depression ( ID ) F2 plant without gr
... Show More