Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.
The research aims to determine the impact of the use of teaching aids for the textbook and graphics teacher illustrations in the collection of historical information and retention, limited research on a sample of students in grade five numbered (68) primary school students of Benin in Baghdad governorate / Breeding Rusafa First, select the researchers of scientific material for students in research Topics are the first and second chapter of the Book of the Arab-Islamic history, set by the Ministry of Education.
And promising targets behavioral and according to the content of subject numbered (100) goal and lesson plans exemplary nu
... Show MoreEuphemisms are advantageous in people’s social life by turning sensitive into a more acceptable ones so that resentful feelings and embarrassment can be avoided. This study investigates the ability of Iraqi English learners in using euphemistic expressions, meanwhile, raising their awareness and the faculty members in English teaching faculties regarding the relevance of discussing the topics that demand euphemisation. This study comprised three stages: initial test, explicit instruction with activities, and a final test for the students’ development in this domain. A test has been distributed among 50 respondents, who are at the fourth year of their undergraduate study at the University of Babylon/ College of Basic Education. The lo
... Show MorePro-inflammatory cytokines play an important role in intercellular communications. In the last two decades, many cytokines have been identified in human milk. These cytokines are variable according to different conditions such as pathogenic infections which strongly stimulated the immune response. The present study aims to determine of IL1β and TNF-α in Toxoplasma gondii-free and infected women in an attempt to clarify the impacts of the infections on cytokines especially in mother's milk. The serum and milk sample were collected from 96 samples (48 for seropositive and 48 for seronegative). To confirm the Toxoplasma gondii infection; enzyme linked immunofluorescence assay (ELIFA) was used to detect anti-Toxoplasma Ig
... Show MoreThe individual average income is considered one of the most used criteria for the distinguishing between the developed and the developing countries, for this reason the efforts of economic development has been construed on increasing the average national income, the investment expenditures is considered one of the basic foundations for economic development operation which lead to the expanding the prodection power of the economy, and increasing the level of national income in an averages greaten than the primary expenditures due to the work and interaction between the multiplier and the accelerator. But the ability of the economic sectors in the generation of national income as a result of the primary expenditures is different fr
... Show MoreThis paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
الاهمية الاقتصادية للموانىء الحرة مع الاشارة الى المنطقة الاقتصادية الحرة المقترحة في ميناء الفاو
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreObjective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreMost of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable. Fortunately, various lightweight encryption algorithms could be used to increase defense against various at
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More