Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The evaluation a proposed strategy for the Ministry of Planning for the years 2018-2022 .
...Show More Authors

abstract

the research discussed a stage of strategic management. The strategic of the evaluation of the proposed strategy through feedback is to ensure that it is implemented with the least possible variation. The research aims at evaluation  a proposed strategy for the Ministry of Planning for the years 2018-2022 in line with the orientations of the state, taking into account the surrounding environmental conditions. It relies on scientific bases and steps to formulate the strategy The extent of the strategy suitability was tested through a set of statistical means and its objectivity was verified through a survey of a number of specialized experts who were selected in accordance with the principle

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Testing of a Potentially Used Antiseptic Consists of Povidon Iodine, Hydrogen Peroxide and Aloe Vera
...Show More Authors

In this study a new antiseptic was formulated and tested to match the effectiveness against microorganisms. The formulation consisted of Povidone - Iodine (PVP-I) (10%), H2O2 (3%) and Aloe Vera gel (pure). Different ratios of these materials were prepared within the acceptable range of pH for an antiseptic (3-6). The prepared samples were tested. The In Vitro test was performed by using four bacteria, two were Gram-Positive (Staphylococcus aureus and Bacillus cereus) and two were Gram-Negative (Escherichia coli and Pseudomonas aeruginosa). The new antiseptic showed 100% killing rate for E. coli, Ps. aeruginosa and S. aureus and 96.4667% killing rate for B. cereus. When the new antiseptic was compared with two common

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps
...Show More Authors

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

View Publication Preview PDF
Scopus (15)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research & Development
A Study of the Vertical Position of the Mental Foramen using Cone-Beam Computed Tomography
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 30 2004
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Analysis of a Fixed Bed Absorber Used for the Removal of Pollutants from Water
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Potential of Microalgae Cultivation in Dairy Wastewater as a Step in Low-Cost Biofuel Production
...Show More Authors

The present study addresses adopting the organic and nutritious materials in dairy wastewater as media for cultivation of microalgae, which represent an important source of renewable energy. This study was carried out through cultivation of three types of microalgae; Chlorella sp., Synechococcus, and Anabaena. The results shows the success the cultivation of the Synechococcus and  Chlorella Sp, while the Anabaena microalgae were in low-growth level. The highest growth was in the Synechococcus farm, followed by Chlorella and Anabaena. However, the growth of Synechococcus required 10 days to achieve this increase that re

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 12 2025
Journal Name
Al-adab Journal
Deconstructing the Archetypal Mirror of Godot in Ali Abdul-Nabi Al-Zaidi’s “A Second Death”
...Show More Authors

لطالما كان انتظار الملأ للخلاص والتي ترتبط بشكل اساسي بال "منتظر" او ال "مخلص" جزءا من الوعي الجمعي الذي تطور ليكون مرتبطا بالنمط البدائي والذي بدوره أصبح مرآةً تنعكس على اساسها فرص الانسان نحو النجاة. في مسرح القرن العشرين, لم تنفك فكرة الانتظار ان ترتبط بمسرحية صاموئيل بيكيت العبثية " في انتظار غودو" كونها مثالا رمزيا بالرغم من انه تجسيد شخصية "غودو" وقعت تحت وطأة الكثير من عمليات التحوير والتغيير في اطاره

... Show More
View Publication
Crossref
Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
A Novel Bio-electrochemical Cell with Rotating Cylinder Cathode for Cadmium Removal from Simulated Wastewater
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Jul 31 2025
Journal Name
Computers, Materials & Continua
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
...Show More Authors

The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information. Due to high processing requirements, traditional encryption algorithms demand considerable computational effort for real-time audio encryption. To address these challenges, this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps. The audio data is first shuffled using Tent map for the random permutation. The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map. Finally, the Exclusive OR (XOR) operation is applied between the generated key and the sh

... Show More
View Publication
Scopus Clarivate Crossref