Preferred Language
Articles
/
jcoeduw-1363
Urban Security in Cities Planning
...Show More Authors

Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services which affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city in order to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied. 

View Publication
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of The College Of Education For Women
Gender and Urban Studies as an Interactive Approach and Integrated Curriculum
...Show More Authors

The integration of gender in urban studies is considered a goal and objective to build a society characterized by justice and equality. It further allows all its residents to enjoy the opportunities to live in a safe urban life. Based on the that, the limitations of the research and its field of interest related to the relationship between gender and urban studies have become clear. The insufficient knowledge in this regard considers gender as a concept that does not exist in itself, but rather overlaps and intersects with several concepts and studies, including urban studies. Thus, it has become necessary to adopt a descriptive methodology that helps reach a theoretical framework to explain the beginnings of such an interaction and inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 29 2019
Journal Name
Journal Of Planner And Development
Use of temporary interventions to reclaim neglected urban spaces
...Show More Authors

The research deals with one of the urban problems facing cities, namely the existence of neglected urban spaces that need to be activated , These spaces give a negative image of the city, is not conducive to life and social interactions or the city has a one distinctive urban experience, leading to a reduction peoples' confidence in revisiting of those areas, hinder the rest of the activities in that region . Because these spaces are of the basic components of the city and give it its identity through the elements and entities that constitute it  , The idea of research emerged in the reclaiming of these spaces within contemporary urban trends and the activation of  flexible  , short-term and inovation for that purpose with

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Level of Entrepreneurial Orientation: Analytical Research in the National Security Advisory
...Show More Authors

The current research aims to measure the level of entrepreneurial orientation and its dimensions (creativity, independence, proactivity, risk tolerance, and achievement) in the National Security Chancellery, as its importance and role in guiding senior leaders of the chancellery to make strategic decisions with high quality in various Iraqi concerns, more specifically the security aspect. The data was collected from 94 individuals (the research sample) from the research community (120) individuals at different administrative levels and intentionally where the questionnaire was adopted as a main tool for data collection and the primary data was analyzed through descriptive and inferential statistical methods (arithmetic mean, standard dev

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Psychological Security and Its Relation to Motivation for Achievement of Social Researchers Working in the Courts
...Show More Authors

The research aims to measure the psychological security of social working in the courts, to measure the motivation of achievement for social researchers working in the courts. In addition to, identify the Psychological security and its relation to the motivation of achievement for social researchers working in the courts. To achieve these aims, the researcher adopted two scales: Maslow scale for Psychological security, which was translated to Arabic by Dwany and Dirany 1983 consisted of (75) items. The second scale is Othman scale for achievement motivation 2014 consisted of (24) items. The two scales had been applied to a sample consisted of (100) social researchers working in the courts of Baghdad with its two branches Al-karkh and Al-

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 02 2024
Journal Name
Anggaran Jurnal Publikasi Ekonomi Dan Akuntansi
Do Iraqi Ceo Depending On Strategic Planning In The Face Of Crises
...Show More Authors

Abstract.The goal of this article is to find the CEO of Iraqi companies that use strategic planning and determine if they are capable of diagnosing the traits of strategic planning systems that improve these companies' capacity to successfully address crisis-related needs. The capacity of the company to successfully react to crisis needs and demands is enhanced by the use of strategic planning, according to a review of data from 64 enterprises utilizing statistical analysis. Furthermore, top and division or unit managers must be involved and committed for strategic planning to be successful. It also has to be planned with an external orientation and get more than just lip service from top and unit or division level managers. In other words,

... Show More
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Mathematical Problems In Engineering
Enhanced Simulated Annealing for Solving Aggregate Production Planning
...Show More Authors

Simulated annealing (SA) has been an effective means that can address difficulties related to optimization problems. is now a common discipline for research with several productive applications such as production planning. Due to the fact that aggregate production planning (APP) is one of the most considerable problems in production planning, in this paper, we present multi-objective linear programming model for APP and optimized by . During the course of optimizing for the APP problem, it uncovered that the capability of was inadequate and its performance was substandard, particularly for a sizable controlled problem with many decision variables and plenty of constraints. Since this algorithm works sequentially then the current state wi

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref