Preferred Language
Articles
/
jcoeduw-1364
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Thu Nov 21 2024
Journal Name
مؤتمر
استراتيجية الأمن السيبراني ودورها في تحقيق أهداف التنمية المستدامة: العراق انموذجاً
...Show More Authors

Preview PDF
Publication Date
Tue Nov 06 2018
Journal Name
Arab Science Heritage Journal
العامل العامل الاقتصادي وأثره في نشوء المدن الإسلامية وتطورها ( بخارى ) أنموذجاً
...Show More Authors

After atour-For quite somtime,in the field of research and investingation on the economic aspects and the impact of her money is mportantin the evolution and emegece of the Islamic countres,especially including especially Morkhana him specimer nigh borhood the countries of the mashreq al islami,searhout,among other things summarilesas

View Publication Preview PDF
Publication Date
Thu Oct 25 2018
Journal Name
Journal Of Planner And Development
(الاستخدامات الحضرية للمياه في المدن العراقية حالة الدراسة (مدن الفرات الأوسط
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Educational Planning, it's Importance in the Social, Economical and Educational Development
...Show More Authors

Educational Planning, it's Importance in the Social, Economical and Educational Development

View Publication Preview PDF
Publication Date
Thu Jan 30 2020
Journal Name
Journal Of Engineering
Design and Analysis WIMAX Network Based on Coverage Planning
...Show More Authors

In this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
tourism planning and its impact in reducing the unemployment rate in Iraq for the period (1985 – 2015) An analytical study
...Show More Authors

Abstract

     The problem of the study is the main question (Can tourism planning address the phenomenon of unemployment in Iraq ?) , And the importance of the study in the fact that the tourism sector can become an effective development alternative in many countries, especially Iraq, as tourism contributes to diversify sources of income and stimulate other economic sectors , We know how important Iraq's qualifications are in the field of tourism and what it can generate on the public treasury, To confirm the current study on the need to pay attention to tourism planning for its role in providing employment opportunities that reduce the unemployment rate in the future.

 &n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 08 2023
Journal Name
Journal Of Planner And Development
Statistical Evaluation of the Planning Process and Scheduling Management for Irrigation and Drainage Projects in the Republic of Iraq
...Show More Authors

The Research aims to investigate into reality in terms of planning and scheduling management process for sake the implementation and maintenance of irrigation and drainage projects in the Republic of Iraq, with an indication of the most important obstacles that impede the planning and scheduling management process for these projects and ways of addressing them and minimizing their effects.                                                  For the purpose of achieving the goal of the research, a sci

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Security Intellectual Proposals of the Paris and the Wales Schools
...Show More Authors

The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties  of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 15 2025
Journal Name
Smart Innovation, Systems And Technologies
The Role of the European Economic Security Strategy in Managing Economic Risks
...Show More Authors

View Publication
Scopus Crossref