Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.
Abstract
Nowadays, the adoption of economic unity on the accuracy of financial reporting is very important. Economic units need accurate financial reporting to be more competitive and to improve the performance. Management can also achieve financial information in real time through the application of ERP systems. This system will facilitate management to access the most up-to-date information such as planning, monitoring and evaluating the business processes of the organization to be more effective.
On the practical side, the Enterprise Resource Planning (ERP) system was applied to the General Company for Vegetable Oils to demonstrate a course in enhancing the accuracy of financial reporting.
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreThe Research aims to investigate into reality in terms of planning and scheduling management process for sake the implementation and maintenance of irrigation and drainage projects in the Republic of Iraq, with an indication of the most important obstacles that impede the planning and scheduling management process for these projects and ways of addressing them and minimizing their effects. For the purpose of achieving the goal of the research, a sci
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe aim of this research does not deal with evaluation occurs at any points in the design of the plan alternatives themselves or formulation of goals and objectives. The aim of this research is that test and evaluate the fully alternatives. We can therefore state as the principle that evaluation of alternative plans must be based on attempts to show how far each plan satisfies all the objectives are expressed as specification of the performance of the urban and regional system. The planner can submit the result (as in the traditional way) for each alternative, with particular reference to the weighting of objectives. The summery result can be presented and the preferred plan indicated that with largest index of Goals-achievement.
... Show MoreThis work focused on anthropogenic influences of the trace metals distribution in the soils of Kirkuk city. Sequential extraction technique was used to determine the distribution of the chemical fractions of Ag, Cd, Co, Cu, Ni, Pb, Zn, As, Cr and V in soil of Kirkuk city. This area is affected mainly by burning oil trash. Results show that these heavy metals were primarily restricted to surface horizons and mostly associated with the residual fraction (28.8 – 50%). The remnant fractions (13.8 – 33.1%) linked to the organic matter, 7.9 – 27.2% was bound to Fe-Mn oxide, 0.7 – 27.9 was bound to carbonate. Only a small amount of the total metals in the soil is exchangeable (0.5 – 4.2%) and water soluble (0 – 4.1%) fractions.
... Show MoreThe study of human factors and the extent of their impact on the construction of land transport roads is of great importance because they are variable factors, which are on the contrary natural factors, and the impact of human factors on road construction operations is evident through the study of population distribution and size, and economic activities (agricultural, industrial, tourism). And its direct mutual relationship with the construction and extension of land transport routes and the development of each of them, and then directing them to serve urban and rural human settlements, which leads to their development and improvement of their economic, living and social conditions on the one hand, and contributes to the emergence
... Show More