Preferred Language
Articles
/
HRc3FY0BVTCNdQwCABEB
Complete Street as a Key for Urban Environment Development
...Show More Authors

Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad.   Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements.   Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobility.   Results and conclusion: This paper concluded that the implementation of a complete street strategy in the study area will lead to the development of urban environments.    Research implications: Encouraging street users to switch to active and public transportation and reduce dependence on vehicles.   Originality/value: This paper can contribute to finding solutions to problems of urban environment degradation, which suffers from traffic congestion and its associated problems.

Scopus Crossref
View Publication
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Urban Form Elements and Urban Potentiality ( Literature Review)
...Show More Authors

Morphological theories shape the leading platform to theoretically and practically consider the assets connected with the emergence of the city, and its growth and development over time. In this paper, five elements of the urban form are typified: structure/tissue, plot, building, block, and the street pattern will be addressed. Understanding the urban form at the different levels within its ingredients could lead to shape a base launch of how to consider the potentiality of the development and sustainability of a particular area.   

View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon May 27 2019
Journal Name
Al-academy
A Hypothesis of Architectural Environment Exercise for Actor Training (Continuous exercise space workshop – A model): هيثم عبد الرزاق علي
...Show More Authors

The peculiarity of the theater does not lie in its dramatic content because many literary genres and other artistic styles share with it in this content. The peculiarity of the theater lies in contemplating the drama through what is architectural, and this architectural axis is what distinguishes its character. It is a spatial poetry which is composed by the laws of physics and chemistry, (Weight, height, distance, rhythm, gravity, impulses and chemical excretions). i.e., what cannot be expressed in words. This is a game of space to exchange and organize energy and communicate in space by the living body, which contains the possibilities of the living drawing in space: in the time and place. This research deals with the importance of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
Stability analysis of a competitive ecological system in a polluted environment
...Show More Authors

The interplay of species in a polluted environment is one of the most critical aspects of the ecosystem. This paper explores the dynamics of the two-species Lokta–Volterra competition model. According to the type I functional response, one species is affected by environmental pollution. Whilst the other degrades the toxin according to the type II functional response. All equilibrium points of the system are located, with their local and global stability being assessed. A numerical simulation examination is carried out to confirm the theoretical results. These results illustrate that competition and pollution can significantly change the coexistence and extinction of each species.

View Publication Preview PDF
Scopus (15)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Suitable Investment environment For business sector in Iraq
...Show More Authors

        Investment Bases directly and closely to an environment characterized by political, social and economic stability, and through a range of policies and institutions and economic laws that affect investor confidence and convince him directing investments to country without the other, where inter conditions and circumstances affecting the trends of capital and settle in, and political situation of the country and what is characterized of stability or disorder as well as economic conditions that are affected by what is distinguishes the country from geographic and demographic characteristics are reflected on availability of production elements and country's infrastructure.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Green Training and Development on Sustainable Performance: An Analytical Research in the Ministry of Environment
...Show More Authors

The current study aims to test the impact of green training and development on sustainable performance and explore its effects within and outside the Iraqi Ministry of Environment. The main research problem revolves around the question of the extent of implementing green training and development and sustainable performance in the ministry (What is the nature of the relationship between green training and development and sustainable performance in the ministry?). To clarify the relationship between the research variables, two main hypotheses were formulated along with sub-hypotheses. The study also aims to assess the level of the ministry's interest in the research variables and provide key recommendations to enhance sustainable performan

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Apr 23 2018
Journal Name
International Journal Of Quantum Information
Key rate estimation of measurement-device-independent quantum key distribution protocol in satellite-earth and intersatellite links
...Show More Authors

In this work, an estimation of the key rate of measurement-device-independent quantum key distribution (MDI-QKD) protocol in free space was performed. The examined free space links included satellite-earth downlink, uplink and intersatellite link. Various attenuation effects were considered such as diffraction, atmosphere, turbulence and the efficiency of the detection system. Two cases were tested: asymptotic case with infinite number of decoy states and one-decoy state case. The estimated key rate showed the possibility of applying MDI-QKD in earth-satellite and intersatellite links, offering longer single link distance to be covered.

View Publication
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (8)
Crossref