This mixed method research analyses urban heritage and identity management concerning Karbala, and important spiritual and historical center. Homing in on particular spatial issues germane to Muharram’s rites, this study explores spiritual activities for the remembrance of the martyrdoms of Imam Hussein (A) and his brother Abbas (A), and their followers (RA), and identifies the way in which such activities construct urban identity in Karbala. Furthermore, this study contemplates the deployment of contemporary AR and VR technologies for urban identity. After reviewing extensive studies on religious, cultural, and urban heritage, a field survey of the Muharram pilgrimage in Karbala was conducted, spatially analyzing pilgrims’ movements in public areas. Virtual reconstructions of Karbala using immersive technologies are explored to increase visitor engagement to determine physical-virtual spatial interactions’ shaping of preservation and experiences. The results indicate that Muharram rites, especially Hussaini processionals, inherently embody urban, cultural, and religious identifications with Karbala, literally shaping the city’s physical form and promoting social engagement in temporary congregation areas. Furthermore, the virtual technological immersive experiences, including the Day of Ashura, promote ancillary and even remote comprehension of cultural importance and knowledge transmission. Additionally, the integration of VR and AR in cultural heritage preservation not only enhances historical documentation but also creates immersive educational experiences. These technologies bridge the gap between physical and virtual engagement, ensuring that visitors—both present and remote—can interact with Karbala’s cultural legacy in a meaningful way. This approach fosters a stronger emotional and cognitive connection to the city's rich spiritual and historical narratives. This study is original in its multipronged analysis, encompassing virtual technology and spatial analysis for complementary heritage and culture conservation and reconstruction in Karbala. It offers urban planning, cultural preservation, and technological development insights, and charts the course for sensitive modernization in Karbala. Copyright: ©2025 The authors.
The research aims to identify the definitional framework for accounting violations and audit procedures in accordance with international auditing standards, preparing a proposed audit program to audit violations resulting from the transition to the unified accounting system in the research sample according to the relevant international auditing standards, as the proposed audit program was prepared according to International auditing standards in order to improve the auditor’s procedures in detecting accounting violations when auditing the financial statements of municipal departments. The research concluded the most important recommendations: The necessity of adopting the audit program proposed by the researcher, for the purpose of act
... Show MoreThe importance of this research lies in shedding light on the concept of techno-strategy for information management from vital and important topics that showed response for change in all areas of life. As this necessitates the updating and changing of it in order to achieve its strategic goals and enhance its technological advantage. The research problem looked at the role of the information technology system (ITS) in enhancing risk management in general directorates for sports and school activity from the viewpoint of its department heads. The research aimed at the relationship of information techno-strategy in risk management and the ratios of the contribution of information techno-strategy in risk management from the viewpoint of heads o
... Show MoreTennessee Williams' The Glass Menagerie is peopled with powerless and defenseless characters. These characters are hypersensitive and in a constant search for protection. They are highly pressurized by life and its bitter reality. Adding to that they are haunted by their fear from the future. They are escapist who try their best to hide behind a protective shield. Their tireless search for security is never smothering. Their only possible defensive mechanism is to flee from their immediate hostile and aggressive surrounding. To achieve this aim, each character has improvised a method that suits him / her best. For example, one of the characters (Tom) sought refuge in alcohol and late night shows. While the other (Amanda) chose to re-live th
... Show MoreFloods caused by dam failures can cause huge losses of life and property, especially in estuarine areas and valleys. In spite of all the capabilities and great improvements reached by man in the construction of dams and their structures, they will remain helpless before the powerful forces of nature, especially those related to tectonic activation, and the occurrence of earthquakes of different intensities.
The region extending from the Ilisu Dam in Turkey to the Mosul Dam in Iraq was chosen as an area for this study, and the HEC-RAS application was used to simulate the collapse of the Ilisu Dam due to a major earthquake, to know the magnitude of the risks and losses that could result
Preserving the independence and sovereignty of the countries of the South Caucasus region, establishing political and economic stability in the region, and supporting regional cooperation are the main elements of Turkish foreign policy towards the region. The South Caucasus region, which has historical and cultural ties between it and Turkey, is a bridge that links Turkey to Central Asia.
Turkey later developed advanced relations with Azerbaijan and Georgia. However, the same momentum was not achieved in terms of relations with Armenia because of the conflict over Nagorny Karabakh
... Show MoreCryptography is the technology of protecting information and communication by means of encoding the sending information. Existing methods often operate within predetermined mathematical structures which can be subject to pattern recognition and which are lack biological randomness. To address these challenges, this paper introduced a new bio-inspired cryptography approach to protect text messages using the coding mechanisms of DNA and RNA materials. The encryption system consists of six steps: encoding the plaintext message into DNA sequences, transcribing DNA into RNA, applying the complementary base pairing, scrambling RNA segments, optional reverse transcription, and encoding the resulting DNA-RNA characters into ciphertext. Rand
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe process of granting loans by banks is the confidence they give to their customers, but this trust should not be a cornerstone in granting loans even if granted these loans on the basis of sound banking should involve risks that may be exposed to the bank because of the failure of the client to meet The bank's financial obligations to the bank due to the unexpected economic conditions affecting the customers, which makes them in a state of faltering, which weaken the ability of banks to provide loans, which are the most important sources of revenue and profits, so the problem of non-performing loans is one of the main problems facing most of the banks Which impede the functioning of its work and the reasons that led to the agg
... Show More