Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
In this work, an efficient energy management (EEM) approach is proposed to merge IoT technology to enhance electric smart meters by working together to satisfy the best result of the electricity customer's consumption. This proposed system is called an integrated Internet of things for electrical smart meter (2IOT-ESM) architecture. The electric smart meter (ESM) is the first and most important technique used to measure the active power, current, and energy consumption for the house’s loads. At the same time, the effectiveness of this work includes equipping ESM with an additional storage capacity that ensures that the measurements are not lost in the event of a failure or sudden outage in WiFi network. Then then these measurement
... Show MoreThis study is marked by: The ignorant poem and body language
Its main objective is to reveal the manifestations of this language in the text mentioned, and accordingly, the sieve poem has been read semantic (semantic) and hermeneutic, revealing the poet's ability to employ symbols and signals (body language) in the poem chosen for this purpose; The existence of such language in pre-Islamic poetry. After a long reflection and reading, the signs and symbols of the physical movement of the body, and its feminine and aesthetic manifestations were identified, and this was achieved through the use of modern critical methodologies that directly affect this language. The study consisted of an introduction and three topics, followed by t
The essay investigates the rise and development of the prose poem form in Iraqi poetry in the period during and after the 1980s Iraq–Iran war. The essay follows the legacy of Western experiments with form following the First World War and their impact on the development of form in Iraqi poetry culminating in the prose poem. The dominance of this form on poetic development in this period has a close relationship with the experience of warfare and the ensuing of the cultural changes in Iraq after 1980. Poets of the 1980s war used poetic form as a means of dissent. The prose poem became for them an inherently subversive form that reflected their disaffection with the political, cultural, and literary conflicts of the time. The prose poem in
... Show MoreABSTRACT Background: Polycystic ovary syndrome (PCOS) is one of the most common endocrine disorders affecting women in their reproductive age.It is characterized by anovulation or oligo-ovulation and hyperandrogensim.Androgen excess is the central defect in polycystic ovary syndrome. It is a complex disorder affects general health in addition to oral health.This study aimed to assess the gingival health status among a group of women with polycystic ovary syndrome as well as to estimate the levels of salivaryfree testosterone in unstimulated saliva in relation to gingival health condition. Materials and methods: Sixty two women with an age range 20-25 years old and with a body mass index range18.5-24.9 (normal weight) were included in this s
... Show MoreNitroso-R-salt is proposed as a sensitive spectrophotometric reagent for the determination of paracetamol in aqueous solution. The method is based on the reaction of paracetamol with iron(III) and subsequent reaction with nitroso-R-salt to yield a green colored complex with maximum absorption at 720 nm. Optimization of the experimental conditions was described. The calibration graph was linear in the concentration range of 0.1 – 2.0 ?g mL-1 paracetamol with a molar absorptivity of 6.9 × 104 L mol-1 cm-1. The method was successfully applied to the determination of paracetamol in pharmaceutical preparations without any interference from common excipients. The method has been statistically evaluated with British Pharmacopoeia method a
... Show MoreCriticism is inherently impolite and a face-threatening act generally leading to conflicts among interlocutors. It is equally challenging for both native and non-native speakers, and needs pre-planning before performing it. The current research examines the production of non-institutional criticism by Iraqi EFL university learners and American native speakers. More specifically, it explores to what extent Iraqi EFL learners and American native speakers vary in (i) performing criticism, (ii) mitigating criticism, and (iii) their pragmatic choices according to the contextual variables of power and distance. To collect data, a discourse-completion task was used to elicit written data from 20 Iraqi EFL learners and 20 American native speaker
... Show MoreThis work presents the use of laser diode in the fiber distributed data interface FDDI networks. FDDI uses optical fiber as a transmission media. This solves the problems resulted from the EMI, and noise. In addition it increases the security of transmission. A network with a ring topology consists of three computers was designed and implemented. The timed token protocol was used to achieve and control the process of communication over the ring. Nonreturn to zero inversion (NRZI) modulation was carried out as a part of the physical (PHY) sublayer. The optical system consists of a laser diode with wavelength of 820 nm and 2.5 mW maximum output power as a source, optical fiber as a channel, and positive intrinsic negative (PIN) photodiode
... Show MoreThe electrocardiogram (ECG) is the recording of the electrical potential of the heart versus time. The analysis of ECG signals has been widely used in cardiac pathology to detect heart disease. The ECGs are non-stationary signals which are often contaminated by different types of noises from different sources. In this study, simulated noise models were proposed for the power-line interference (PLI), electromyogram (EMG) noise, base line wander (BW), white Gaussian noise (WGN) and composite noise. For suppressing noises and extracting the efficient morphology of an ECG signal, various processing techniques have been recently proposed. In this paper, wavelet transform (WT) is performed for noisy ECG signals. The graphical user interface (GUI)
... Show More