Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.
This study examines the opportunity presented by the COVID-19 pandemic for city planners and leaders to learn from the crisis and build resilient cities with long-term societal, economic, and environmental resilience against future disasters. The research focuses on the relationship between urban planning and policies and the extent of their resilience, particularly in response to pandemic-related disasters. The study evaluates the ability of the city of Baghdad to respond to the pandemic and identifies gaps in its resilience. The study uses the scorecard measurement instrument to examine the disaster resilience of cities, with a focus on governance and financial capability, disaster planning and preparedness, and disaster response
... Show MoreAshShinnafiyah and AsSamawa cities suffer from significant increase in salinity of Euphrates River water compared with their counterpart's north AshShinnafiyah city which is reflected adversely on the quality of water within the study area. The study aims to find possible solutions to avoid the deterioration of Euphrates River northern AshShinnafiyah city until AsSamawa city that were
presented by total dissolved solid TDS. Twelve main hydrological and fifteen salinity measurement stations were selected to cover 117 km of the river reach within the study area during July-2011. Additional twenty three hydrological and salinity stations were adopted during March-2012, winter season to the river within the study area. After conducting t
The approach of greening existing buildings, is an urgent necessity, because the greening operation provides the speed and optimal efficiency in the environmental performance, as well as keeping up with the global green architecture revolution. Therefore, greening existing buildings in Iraq is important for trends towards renewable energies, because of what the country went through economic conditions and crises and wars which kept the country away from what took place globally in this issue. The research problem is: insufficient knowledge about the importance and the mechanism of the greening of existing buildings, including its environmental and economic dimensions, by rationalization of energy consumption and preservi
... Show MoreIt is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.
Research indicates that the second half of the twentieth century marked large interests in the service industry by government and private organizations in that one, and the service industry has become the bedrock of plans in achieving economic and social development. From this standpoint felt specialists and researchers the importance of transport modes, including rail, which should be available between Almnltq Civil populated as services organized by the competent authorities to achieve the active participation of citizens in economic and social development in the region and that the term services means economic activities, which are the results Pollack concrete such as accepting the situation and satisfaction them or satisfacti
... Show MoreSocietal security is regarded as a basic need for human society through which the stability, progress and prosperity of the nation is measured. It is the guarantor of the safety of individuals and groups from various internal and external dangers, based on the protection of the three pillars: the individual, the family, and society. For decades, Iraq has witnessed the phenomenon of political instability, represented by its entry into several wars, starting with the 1948 war, leading up to the American war on Iraq in 2003. Then, those wars were followed by an era in which corruption and terrorism spread, and this, in turn, led to the fragmentation of the national will and the division of Iraqi public opinion regarding many regional and inte
... Show MoreHS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreAspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.