Preferred Language
Articles
/
bsj-7312
IPv6 Security Issues: A Systematic Review Following PRISMA Guidelines
...Show More Authors

Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Ultra Wideband Cognitive Network Objective Issues
...Show More Authors

Due to that the Ultra Wide Band (UWB) technology has some attractive features like robustness to multipath fading, high data rate, low cost and low power consumption, it is widely use to implement cognitive radio network. Intuitively, one of the most important tasks required for cognitive network is the spectrum sensing. A framework for implementing spectrum sensing for UWB-Cognitive Network will be presented in this paper. Since the information about primary licensed users are known to the cognitive radios then the best spectrum sensing scheme for UWB-cognitive network is the matched filter detection scheme. Simulation results verified and demonstrated the using of matched filter spectrum sensing in cognitive radio network with UWB and pro

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 29 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Periimplantitis- A review
...Show More Authors

This review article concentrates the light about aetiology and treatment of the periimplantitis.

View Publication Preview PDF
Publication Date
Tue Mar 03 2015
Journal Name
Journal Of Baghdad College Of Dentistry
Periimplantitis-A review
...Show More Authors

Publication Date
Sun Jul 20 2025
Journal Name
Alnakhla Journal Of Science
Synbiotics (A review)
...Show More Authors

The poultry industry is developing continuously and rapidly, this development takes several trends in the poultry industry, such as searching for new alternatives feed additives. The research focused on finding new alternatives feed additives, among these alternatives is Synoptic, which used to maximize the benefit of the two important compounds (probiotics and prebiotics) as these two compounds are considered one of the most alternatives feed additives, which have been used a lot in poultry feeding to maximize the value of these compounds, they were combined into one compound called synbiotic. Several studies confirm that the synbiotic effect on the intestine morphology, which, the ratio villus height and villus: crypt ratio in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 22 2025
Journal Name
اكليل للدراسات الانسانية
Topic review article Britain and Iraq's book The Economic Status of Iraq during the era of the British administration 1914-1921 by Dr. Hussein Ali Falih Al-Khazraji
...Show More Authors

: Summary Iraq suffered under the British administration during the First World War and its entry into an occupation of economic backwardness, and this economic backwardness was linked to the phenomenon of linking Iraq economically to the capitalist world by keeping it as a source of raw materials and a market for capitalist goods, and that the occupation authorities controlled Iraq's economic goods and wealth and mocked them to serve its interests and achieve their political and economic goals that it drew before the war.

View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Methodology of the concept of sovereignty in contemporary Islamic thought
...Show More Authors

The methodology of the concept of sovereignty in contemporary Islamic thought

View Publication Preview PDF
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
A Study of Feminist Stylistic Analysis of Language Issues of Gender Representation in Selected Literary text
...Show More Authors

Stylistics is the analysis of the language of literary texts integrated within  various approaches to create a framework of different devices that describe and distinct a particular work. Therefore, feminist stylistics relied on theories of feminist criticism tries to present a counter- image of a woman both in language use and society, to draw attention , raise awareness and change ways that gender represents. Feminist stylistic analysis is related not only to describe sexism in a text, but also to analyze the way that point of view, agency, metaphor, and transitivity choices are  unanticipatedly and carefully connected to issues of gender(Mills,1995:1)            &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Arab Food's Security
...Show More Authors

Arab Food's Security

View Publication Preview PDF
Publication Date
Sun Oct 01 2017
Journal Name
Al–bahith Al–a'alami
Issues of Media Trials in Iraqi after 2003
...Show More Authors

The Supreme Judicial Council decided on July 3, 2003, to set up a court to deal with the issues of publication and media. This court tries to solve the problems of media and publishing in both its civil and penal aspects. The decision of establishing the court represents a new and important step to be taken by the Iraqi Judicial Council for the tremendous development witnessed by media sector in general and press in particular especially after 2003.
This study includes two main axes: the first one deals with the most important crimes of publication in the Iraqi legislations such as the crimes of defamation, libel, insult, indecency, and incitement; the second deals with an analytical survey of the completed cases i.e. the issues tha

... Show More
View Publication Preview PDF
Crossref