Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Recent technological developments in the mass media a major paradigm shift in important segments of society, particularly among young people in particular social networking sites including (Facebook) .
it was able to link the sprawling parts of the world and paved the way for all the communities of convergence and exchange views, ideas and desires as provided by their ability to communicate through the use of video clips,pictures,share files, chat, communicate and direct interaction between the audience for this the means. Wondered problem Find the role that can be played using the university youth to the social networking site (Facebook ) to modify their attitudes or their interest in Iraqi society issues, With focused research objec
Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
Periodontitis is a persistent bacterial-causing disease which damages the supporting periodontium of the teeth. The complexity of supporting tissue structure makes the regeneration a challenge for periodontists. Early investigations were focused on discovering therapeutic substitutes that are biocompatible, simple to prepare and economic. This might cause a local release of growth factors that accelerate the healing process of the soft and hard tissue. Recently, platelet-rich fibrin (PRF) has received a wide attention as a biocompatible regenerative material in both dental and medical fields. PRF is a natural fibrin-derived biomaterial, and it is easy to obtain. It can be gotten from individual blood without the use of any external anticoag
... Show MoreIn this review, previous studies on the synthesis and characterization of the metal Complexes with paracetamol by elemental analysis, thermal analysis, (IR, NMR and UV-Vis (spectroscopy and conductivity. In reviewing these studies, the authors found that paracetamol can be coordinated through the pair of electrons on the hydroxyl O-atom, carbonyl O-atom, and N-atom of the amide group. If the paracetamol was a monodentate ligand, it will be coordinated by one of the following atoms O-hydroxyl, O-carbonyl or N-amide. But if the paracetamol was bidentate, it is coordinated by atoms (O-carbonyl and N-amide), (O-hydroxyl and N-amide) or (O-carbonyl and O-hydroxyl). The authors also found that free paracetamol and its complexes have antimicrobial
... Show MoreMT Suhail, SA Hussein, MN Abdulhussein, WQ Abdaullateef, M khairallah Aid…, Migration Letters, 2024
Antibacterial substances belong to a group of compounds that attack dangerous microorganisms. Therefore, killing bacteria or reducing their metabolic activity will lessen their adverse effects on a biological system. They originated from either synthetic materials, microbes, or mold. Many of these medications treat the gram-negative bacteria from the critical precedence group, such as pseudomonas, carbapenem-resistant acinetobacter, and enterobacterales. This study aims to investigate the simultaneous analysis of specific antibacterial spectrophotometrically. The WHO maintains this list of priority infections with antibiotic resistance. Drug combinations in single dosage forms are becoming increasingly popular in the pharmaceutical industry
... Show More