The problem of informal settlements in Iraqi is one of the most serious problems due
to its economic, social and security impacts which jeopardize the society safety and stability.
This study investigates the present situation of informal settlements in the Baghdad
governorates as well as approaches followed in making decisions to either upgrade or remove
those areas. Requirements of each decision are also discussed.
Study methods relied on both office and field studies to collect data and information
needed. The study revealed important findings that would help take appropriate measures that
deal with the informal settlements in Iraqi. The study also proposes effective mechanisms to
preclude both an increase in current informal settlements' areas and the emergence of new
informal settlements.
At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show MoreFree Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronizat
... Show MoreImage is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran
... Show MoreAbstract:
This research emerged due to the needs of Iraqi social sector for diagnosing the problems ,finding the appropriate solutions,and exploiting the social opportunities to solve these problems .The research problem focused on raising the following question: "Were Iraqi Managers in the Ministry of Labor and Social Affairs able to use their qualifications as social entrepreneurs in the ministry to improve the quality of life of the disadvantaged groups?", In light of that, the importance and objectives of the study were determined, and this research derives its importance from trying to address social problems by measuring the degree of meeting the subjective and objective needs of the custo
This research aims to analyze the intellectual and civilizational regression that afflicted Iraqi and Arab society due to political and religious tyranny and internal conflicts, which was reflected in the deterioration of human rights values and the absence of equality and justice in dealing with the other religiously, which affected the reluctance of members of religious groups to interact with their national societies and then migrate to Outside, which contributed to a double loss, in terms of the loss of these societies by productive and effective national competencies, and in terms of distorting the image of Islam. The research stressed that the first treatments of this phenomenon are the consolidation of the values of citize
... Show MoreDuring the last two decades at least, increased interest in Social attraction variable by scientists in psychology and sociology, to multi-dimensional and its association with psychological and emotional variables , and what are of importance in the process of human communication , leadership, and social relations.
Social psychologists interested in social attraction also so its relation with social influence , political and occupational .
"Social attraction defined as "individual ability functioned his skills in at
The main focus of research is on how to achieve the internal and external dimensions of corporate social responsibility through human resources management strategies, which is a major of research aimed. The main problem of this research was confirmed, which confirms that there is an unclear role for social responsibility, lack of human resources management strategies, and ambiguity of roles in the municipality under study. The diagnose of the problem and determining the gap between the internal and external dimensions of social responsibility and human resources management was identified, which attacked the researcher's attention to navigate in this subject, look for the reasons for the gaps and try to reduce them. The case study
... Show MoreThe Internet image retrieval is an interesting task that needs efforts from image processing and relationship structure analysis. In this paper, has been proposed compressed method when you need to send more than a photo via the internet based on image retrieval. First, face detection is implemented based on local binary patterns. The background is notice based on matching global self-similarities and compared it with the rest of the image backgrounds. The propose algorithm are link the gap between the present image indexing technology, developed in the pixel domain, and the fact that an increasing number of images stored on the computer are previously compressed by JPEG at the source. The similar images are found and send a few images inst
... Show More