Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city in order to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.
The communication networks (mobile phone networks, social media platforms) produce digital traces from their usages. This type of information help to understand and analyze the human mobility in very accurate way. By these analyzes over cities, it can give powerful data on daily citizen activities, urban planners have in that way, relevant indications for decision making on design and development. As well as, the Call detail Records (CDRs) provides valuable spatiotemporal data at the level of citywide or even nationwide. The CDRs could be analyzed to extract the life patterns and individuals mobility in an observed urban area and during ephemeral events. Whereas, their analysis gives conceptual views about human density and mobility pattern
... Show MoreThe research shed light on the historic evolution of Baghdad through its long, expansive history. The starting point focuses on the geographic characteristics, and the nature of its habitation, prior to laying the circular plan of Baghdad. Then the research proceeds to cover the stage of building the round city of Baghdad. The research continue to cover the expansion and sequential growth across the banks of Tigris river.
A concentrated attention is devoted to analyses the morphological, geographical and above all the makeup of present day city of Baghdad, pinpointing the apathetic plans, decisions, and actions which completely disfigured the image, and tradition of the old city of Baghdad, behind the delusive slogans of “comprehens
This study try to discovering continuity in heritage, from its engaged with emotional side, the core of study is Islamic architectural, these architectural result still estate with time, due to role of it with Islam law, importance of continuity from finding real things of essential architects result The research reaching to concept of thoughtstaying, for Islamic heritage, as basic factor in continuity process by it is architecture. The mostly searches seeing imitation of figures as recently events, or as final result to stage conditions state, but we must remember the Islamic thinking as base stone to architecture results
.
Urban land uses of all kinds are the constituent elements of the urban spatial structure. Because of the influence of economic and social factors, cities in general are characterized by the dynamic state of their elements over time. Urban functions occur in a certain way with different spatial patterns. Hence, urban planners and the relevant urban management teams should understand the future spatial pattern of these changes by resorting to quantitative models in spatial planning. This is to ensure that future predictions are made with a high level of accuracy so that appropriate strategies can be used to address the problems arising from such changes. The Markov chain method is one of the quantitative models used in spatial planning to ana
... Show MoreThis paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC
... Show MoreCredential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.