Since Internet Protocol version 6 is a new technology, insecure network configurations are inevitable. The researchers contributed a lot to spreading knowledge about IPv6 vulnerabilities and how to address them over the past two decades. In this study, a systematic literature review is conducted to analyze research progress in IPv6 security field following the Preferred Reporting Items for the Systematics Review and Meta-Analysis (PRISMA) method. A total of 427 studies have been reviewed from two databases, IEEE and Scopus. To fulfil the review goal, several key data elements were extracted from each study and two kinds of analysis were administered: descriptive analysis and literature classification. The results show positive signs of the research contributions in the field, and generally, they could be considered as a reference to explore the research of in the past two decades in IPv6 security field and to draw the future directions. For example, the percentage of publishing increased from 147 per decade from 2000-2010 to 330 per decade from 2011 to 2020 which means that the percentage increase was 124%. The number of citations is another key finding that reflects the great global interest in research devoted to IPv6 security issues, as it was 409 citations in the decade from 2000-2010, then increased to 1643 citations during the decade from 2011 to 2020, that is, the percentage increase was 302%.
The objective of this study is to determine the extent to which the determinants of organizational support contributed to enhancing the mental status of banking services in a number of banks in Dohuk governorate in order to diagnose the correlation between the perceived organizational support and the mental status of services. Availability in the environment of banks and to enhance the mental position from the point of view of customers as the main hypotheses focused on the nature of the relationship between the dimensions of research among them has been tested these hypotheses using statistical and descriptive methods have been The study concluded that the contribution of organizational support, which is
... Show MoreBiometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreIn this work, functionally graded materials were synthesized by centrifugal technique at different
volume fractions 0.5, 1, 1.5, and 2% Vf with a rotation speed of 1200 rpm and a constant rotation time, T
= 6 min . The mechanical properties were characterized to study the graded and non-graded nanocomposites
and the pure epoxy material. The mechanical tests showed that graded and non-graded added alumina
(Al2O3) nanoparticles enhanced the effect more than pure epoxy. The maximum difference in impact strength
occurred at (FGM), which was loaded from the rich side of the nano-alumina where the maximum value was
at 1% Vf by 133.33% of the sample epoxy side. The flexural strength and Young modulus of the fu
Various visual media are becoming an increasingly important and active instrument of communication. This fact has led some political parties and leading personalities in Iraq to make use of them as an accepted forum for the discussion of public affairs usually in a manner that conforms to their declared policy. They have to draw as much popular support as they could for the causes which they fight for. As a result, a state of great confusion has been created from the contradictory statements made by the contending parties and gave left grave consequences on all types of the audience receiving them. The problem of the study can be summarized in one major question: What is the opinions of the audience as regards the statements made by the
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show MoreThe main subject of this poem is a chance meeting between Baudelaire and unknown beautiful lady. Her presence represents the far-fetched, magnificent beauty. This beauty forms an aspect of idealism that takes its real existence and disappears immediately.
This emotional poem deals with the continuous despair that dates back to the Romantic age where it was a key topic; the passing woman embodies destiny. All this comes from constant experience and mad love through the poet’s view to a woman paving the way toward the unknown. Baudelaire, however, noticed this unknown through a passer-by that reflected the real and magical image of this unk
... Show MoreThe internet, unlike other traditional means of communication, has a flexibility to stimulate the user and allows him to develop it. Perhaps, the reason for the superiority of the internet over other traditional means of communication is the possibility of change and transmission from one stage to another in a short period. This means that the internet is able to move from the use to the development of the use and then the development of means and innovation as the innovation of the internet is a logical product of the interaction of the user with the network. The internet invests all the proposals and ideas and does not ignore any even if it is simple. This is represented in social networking sites which in fact reflects personal emotio
... Show MoreThe concept of education is not actually restricted to children or school students, but rather every person should be educated and followed up if he is intended to grow and prove, with effort and time allocation as to fulfill that goal. Thus , the current paper aims to a thinking education and to educate that thinking in teacher and it is not new to deal with the personal characteristics of teacher in the different scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n
... Show MoreDylan Thomas (1914-1953) is a modern poet belongs to the apocalyptic movement of the 1940's.This movement is influenced by the doctrines and techniques of surrealism.
Poetry for him should not be primarily concerned with man in society, but with the celebration of spiritual truth. It should bring to light the hidden causes, hence his personal interest is to strip darkness and explore the inward motives. To do this he uses a cluster of images: a constant building up and breaking down of images. His poetry depends on the romantic spontaneity, suggestiveness of the Symbolists and the the surrealists' mysterious liberation of the unconsciousness and
... Show MoreThe tourism industry has become, currently, an art, an industry and a science. It is also one of the components that make up touristic regions. Tourist attractions are no longer the exclusive visits of museums and archeological sites, but also involve other service facilities. It is, therefore, imperative that the authorities should become aware of the degradation of tourist resorts and prevent them from getting worse. Moreover, the authorities should take a set of decisions concerning the protection of the urban aspect with its historical, social, and environmental dimensions, as well as, adapting it to the modern requirements that can bring comfort to the citizens and tourists at physical and psychological levels.