Preferred Language
Articles
/
tebDRZ4BmraWrQ4d0mAw
Preserving and Enhancing Cultural Identity Through Virtual and Augmented Reality: The Case of Karbala
...Show More Authors

This mixed method research analyses urban heritage and identity management concerning Karbala, and important spiritual and historical center. Homing in on particular spatial issues germane to Muharram’s rites, this study explores spiritual activities for the remembrance of the martyrdoms of Imam Hussein (A) and his brother Abbas (A), and their followers (RA), and identifies the way in which such activities construct urban identity in Karbala. Furthermore, this study contemplates the deployment of contemporary AR and VR technologies for urban identity. After reviewing extensive studies on religious, cultural, and urban heritage, a field survey of the Muharram pilgrimage in Karbala was conducted, spatially analyzing pilgrims’ movements in public areas. Virtual reconstructions of Karbala using immersive technologies are explored to increase visitor engagement to determine physical-virtual spatial interactions’ shaping of preservation and experiences. The results indicate that Muharram rites, especially Hussaini processionals, inherently embody urban, cultural, and religious identifications with Karbala, literally shaping the city’s physical form and promoting social engagement in temporary congregation areas. Furthermore, the virtual technological immersive experiences, including the Day of Ashura, promote ancillary and even remote comprehension of cultural importance and knowledge transmission. Additionally, the integration of VR and AR in cultural heritage preservation not only enhances historical documentation but also creates immersive educational experiences. These technologies bridge the gap between physical and virtual engagement, ensuring that visitors—both present and remote—can interact with Karbala’s cultural legacy in a meaningful way. This approach fosters a stronger emotional and cognitive connection to the city's rich spiritual and historical narratives. This study is original in its multipronged analysis, encompassing virtual technology and spatial analysis for complementary heritage and culture conservation and reconstruction in Karbala. It offers urban planning, cultural preservation, and technological development insights, and charts the course for sensitive modernization in Karbala. Copyright: ©2025 The authors.

Scopus Crossref
View Publication
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Procedures for auditing accounting violations according to international auditing : standards in the Karbala Municipality Directorate
...Show More Authors

The research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Innovation, Creativity And Change
The techno-strategy of the management information system and its role in enhancing risk management in the general directorate of school and sport activity
...Show More Authors

The importance of this research lies in shedding light on the concept of techno-strategy for information management from vital and important topics that showed response for change in all areas of life. As this necessitates the updating and changing of it in order to achieve its strategic goals and enhance its technological advantage. The research problem looked at the role of the information technology system (ITS) in enhancing risk management in general directorates for sports and school activity from the viewpoint of its department heads. The research aimed at the relationship of information techno-strategy in risk management and the ratios of the contribution of information techno-strategy in risk management from the viewpoint of heads o

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Wed Mar 09 2022
Journal Name
International Journal Of Research In Social Sciences And Humanities
Escape From Reality in Tennessee Williams' The Glass Menagerie
...Show More Authors

Tennessee Williams' The Glass Menagerie is peopled with powerless and defenseless characters. These characters are hypersensitive and in a constant search for protection. They are highly pressurized by life and its bitter reality. Adding to that they are haunted by their fear from the future. They are escapist who try their best to hide behind a protective shield. Their tireless search for security is never smothering. Their only possible defensive mechanism is to flee from their immediate hostile and aggressive surrounding. To achieve this aim, each character has improvised a method that suits him / her best. For example, one of the characters (Tom) sought refuge in alcohol and late night shows. While the other (Amanda) chose to re-live th

... Show More
Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Theoretical And Applied Information Technology
Factors affecting global virtual teams’ performance in software projects
...Show More Authors

Scopus (24)
Scopus
Publication Date
Tue Dec 01 2015
Journal Name
2015 9th Malaysian Software Engineering Conference (mysec)
Factors for communication technologies selection within virtual software teams
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Oct 24 2024
Journal Name
Applied Water Science
Tectonic activation and the risk of Ilisu Dam collapse to Iraq through modelling and simulation using HEC-RAS
...Show More Authors
Abstract<p>Floods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.</p><p>The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result</p> ... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
The cultural dimension in Turkey's foreign policy towards the South Caucasus (Model Azerbaijan)
...Show More Authors

Preserving the independence and sovereignty of the countries of the South Caucasus region, establishing political and economic stability in the region, and supporting regional cooperation are the main elements of Turkish foreign policy towards the region. The South Caucasus region, which has historical and cultural ties between it and Turkey, is a bridge that links Turkey to Central Asia.                     

     Turkey later developed advanced relations with Azerbaijan and Georgia. However, the same momentum was not achieved in terms of relations with Armenia because of the conflict over Nagorny Karabakh

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 08 2026
Journal Name
Plos One
Text encryption through bio-inspired DNA and RNA sequencing
...Show More Authors

Cryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of the reality of the problem of banking stumbling in Rafidain Bank
...Show More Authors

The process of granting loans by banks is the confidence they give to their customers, but this trust should not be a cornerstone in granting loans even if granted these loans on the basis of sound banking should involve risks that may be exposed to the bank because of the failure of the client to meet The bank's financial obligations to the bank due to the unexpected economic conditions affecting the customers, which makes them in a state of faltering, which weaken the ability of banks to provide loans, which are the most important sources of revenue and profits, so the problem of non-performing loans is one of the main problems facing most of the banks Which impede the functioning of its work and the reasons that led to the agg

... Show More
View Publication Preview PDF
Crossref