Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
Bacterial toxins are considered to be virulence factors due to the fact that they interfere with the normal processes of the host cell in which they are found. The interplay between the infectious processes of bacteria and the immune system is what causes this impact. In this discussion, we are going to focus on bacterial toxins that act in the extracellular environment, especially on those that impair the activity of macrophages and neutrophils. These toxins are of particular interest since they may be found in a wide variety of bacteria. We will be concentrating our efforts, in particular, on the toxins that are generated by Gram-positive and Gram-negative bacteria. These toxins are able to interact with and have an effect on the many dif
... Show MoreSchiff bases (SBs) represent multipurpose ligands that can be prepared from the concentration of prime amines with carbonyl clusters. Creation of SB transition metal compounds via as ligands has opportunity of attaining coordination complexes of abnormal arrangement and stability. These transition metal compounds have extraordinary attention as a consequence of their dynamic portion in metalloenzymes and as biomimetic prototypical complexes as a result of their proximity to usual enzymes and proteins. These complexes are imperative in medicinal disciplines owing to their widespread range of biological actions. They mostly exhibit organic actions involving antifungal, antibacterial, antitumor, antidiabetic, herbicidal, antiproliferative, ant
... Show MoreThis review discusses the gingival biotypes, their characteristics, analysis based on the measurement of the dentopapillary complex. Also discuss their response to inflammation, surgery, and ridge healing after tooth extraction, their influence in the behavior of the peri-implant tissue
There is a real problem when adding micro elements to the soil as a result of fixation, sedimentation, washing or toxicity, and thus economic loss. The plant needs micro elements in very small quantities that do not burn the leaves or cause poisoning to plants, including iron, zinc and boron, as they are essential elements for growth and completing the plant's life cycle, and increase the plant's resistance to diseases and insects, activate enzymes, and form the chlorophyll molecule, in addition to their role in oxidation and reduction processes and vital processes. The use of fertilizers with their modern technology has made the process of activating seeds or foliar nutrition a matter of interest to researchers as a complementary process t
... Show MoreFor the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s
... Show MoreThis paper aims to make a historical review of jet grouting techniques and encountered problems at different sites in several countries. This review is a good guide to understanding the performance and limitations of improved soils or lands. The basic concept of jet grouting technology is to use cement as a binder to accelerate the hardening process of an admixture of material grout and soil. The different case history was conducted in both sand soil and clay soil in the horizontal and vertical direction. Other papers on field construction showed that the grout can be gelled within 5-10 minutes. Due to different cases and studies, these will help improve soil by supporting the foundation load with a minimal settlement.
... Show MoreReview of multidrug sensitivity and resistance in enterococcus
The current research included (the evaluation of Information Security Management System on according to international standard (ISO / IEC 27001: 2013) in Iraqi Commission for Computers and Informatics), for the development of an administrative system for information security is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others. The international legitimacy (represented by the International Organization for standardization (ISO)) remains the basis for matching and commitment and the importance of the application of information Security Management System accordi
... Show MoreThe objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio
The objectives of this study were to review the literature covering the perceptions about influenza vaccines in the Middle East and to determine factors influencing the acceptance of vaccination using Health Belief Model (HBM).
A comprehensive literature search was performed utilizing PubMed and Google Scholar databases. Three keywords were used: Influenza vaccine, perceptions and Middle East. Empirical studies that dealt with people/healthcare worker (HCW) perceptio