Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The current research aims to train students to take benefit of their studies to analyze and taste the artistic works as one of the most important components of the academic structure for students specializing in visual arts; then to activate this during training them the methods of teaching. Consequently, the capabilities of mind maps were employed as a tool that would be through freeing each student to analyze a model of artistic work and think about his analytical principles according to what he knows. Then, a start-up with a new stage revolves around the possibility of transforming this analysis into a teaching style by thinking about how the student would do. The same person who undertook the technical analysis should offer this work
... Show Moreللدراسات التاريخية أهميتها ولاسيما دراسة المؤلفات الذي يعطينا صورة كاملة عن تطور الواقع التاريخي للمرحلة التي عاصرها المؤلف وتكتب دراسة الشخصيات العلمية طابعاً خاصاً ومهم يدفعنا إلى التعريف بالمؤرخ ومنهجه في الكتاب والموارد التي استقى معلوماتهِ منها .
Abstract
The research to have a clear perceptions about the knowledge value added to assess the knowledge resources of the Iraqi private banks, depending on the value added methodology of the proposed defined (Housel & Bell, 2001), which assumes that the knowledge value added come through synergetic relationship between knowledge resource and information technology, trying to the possibility of mainstream theory and its application in the Iraqi environment and interpretation of results, and on this basis was launched search of a research problem took root synergetic nature of the relationship between knowledge (human) resource and
... Show MoreThe university press is an essential pillar in building an academic community to achieve its objectives in the service of society. Since the university press is a means of university media, which is issued by the departments or units of media in Iraqi universities as academic governmental-institutions, so it highlights the activities of the university and link them to its internal society in the first place as the university press is a mirror of the university and its voice is sincerely expressed. This research comes to know the extent of interest of the university press in various student issues.
In order to identify the problem of the research, the method of content analysis was adopted within the survey method
... Show MoreAbstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show MoreObjectives: To assess levels of premenstrual psychological disorders of the students in Bab Al-Mua’dham Complex and to find out the relationship between the levels of premenstrual psychological and physical disorders and some demographic characteristics of the students. Methodology: A descriptive study was accomplished throughout the period from the 1st of October, 2015 to the 8th of July, 2016 to assess the psychological and physical problems. A purposive sample of 313 students distributed among different colleges of Bab Al-Mua’dam complex distributed as following: 82 students are from college of Arts; 79
Fast economical developments in the US. in second half of nineteenth century contained many social results, such as increasing of stealing and killing crimes and expand of Labor strikes, which resulted in violence actions, and presented acceptable reason for emergence specialist security agencies, first of them "Pinkerton Agency". which played important role in all of that, besides that .. its role in American Civil War such as discovering an attempt to kill elected republican president Abraham Lincoln. This research studied all that aspects, focused on period of 1850 - 1899 of agency's history.
The topic of the research on the Observatory of the Walls on Jurisprudential Matters in the Hanafi Fiqh, by Imam San’a Allah bin Ali bin Khalil Al-Ala’iyya Wai al-Naqshbandi, al-Rumi, who died in 1137 AH, which includes seven chapters, the first section of it concerning division and related matters, and the second section in the adaptation It is the apportionment of benefits in common objects, the third section, which pertains to lines, surfaces, and bodies, the fourth section, which concerns the inclined wall and certification, and the fifth section, which concerns the provisions of the walls and its claims, and the sixth section, which concerns the door of roads and doors, the opening of the skylight, the sails of the wing, the can
... Show More