Cities have witnessed great changes since the planning of the first cities. This is due to the increase in population and problems in services that affect urban security. As such, urban security is directed and affected by the nature of city planning and the types of services. Besides, the kind of services plays an imminent place in providing urban security at all levels. Other factors that influence urban security can be limited to the increase of population, economic and social changes. This leads to losing urban control. This study will explore the historical chronology to identify weaknesses in urban planning since its dawn and reaching solutions to protect urban security. The importance of the research lies in achieving urban security in the city through planning after making a comprehensive study of the areas to the weakness and strength of the urban area, the result is to achieve an integrated urban environment that can provide the needs of the residents with all their activities and societal components, so the residents will no longer need to cover their needs or to resort to methods that may prejudice urban security in the city to meet their needs, or to help urban planning generate a crime in certain places of the city if the study of the spaces is not thoroughly studied.
Abstract
The problem of the study is the main question (Can tourism planning address the phenomenon of unemployment in Iraq ?) , And the importance of the study in the fact that the tourism sector can become an effective development alternative in many countries, especially Iraq, as tourism contributes to diversify sources of income and stimulate other economic sectors , We know how important Iraq's qualifications are in the field of tourism and what it can generate on the public treasury, To confirm the current study on the need to pay attention to tourism planning for its role in providing employment opportunities that reduce the unemployment rate in the future.
&n
... Show MoreIn this paper, wireless network is planned; the network is predicated on the IEEE 802.16e standardization by WIMAX. The targets of this paper are coverage maximizing, service and low operational fees. WIMAX is planning through three approaches. In approach one; the WIMAX network coverage is major for extension of cell coverage, the best sites (with Band Width (BW) of 5MHz, 20MHZ per sector and four sectors per each cell). In approach two, Interference analysis in CNIR mode. In approach three of the planning, Quality of Services (QoS) is tested and evaluated. ATDI ICS software (Interference Cancellation System) using to perform styling. it shows results in planning area covered 90.49% of the Baghdad City and used 1000 mob
... Show MoreEducational Planning, it's Importance in the Social, Economical and Educational Development
The Research aims to investigate into reality in terms of planning and scheduling management process for sake the implementation and maintenance of irrigation and drainage projects in the Republic of Iraq, with an indication of the most important obstacles that impede the planning and scheduling management process for these projects and ways of addressing them and minimizing their effects. For the purpose of achieving the goal of the research, a sci
... Show MorePlanning for a city with human identity considers the needs of human being that exist in the traditional cities where it was so easy creating place there, on the other hand, modern cities refuse these values and reduce the human characters of urban fabric elements , and the searching for the concept of " Urban Coherence " considers the knowledge about urban theory, especially Morphological attitudes finding three sides of making the coherence of dense urban fabric which are " Functional Complementarily , Formal Complementarily ,
Contextual complementarily “and the differentiation of these sides within the variety of spatial structural patterns between the organic type of traditional city and the gridiron type of modern city. To
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The aim of this research does not deal with evaluation occurs at any points in the design of the plan alternatives themselves or formulation of goals and objectives. The aim of this research is that test and evaluate the fully alternatives. We can therefore state as the principle that evaluation of alternative plans must be based on attempts to show how far each plan satisfies all the objectives are expressed as specification of the performance of the urban and regional system. The planner can submit the result (as in the traditional way) for each alternative, with particular reference to the weighting of objectives. The summery result can be presented and the preferred plan indicated that with largest index of Goals-achievement.
... Show MoreThe current research aims to identify the level of strategic orientation and its dimensions (vision, mission, goals, and values) in the Iraqi National Security Service (INSS). The researchers followed the descriptive analytical approach as one of the forms of analysis and organized scientific interpretation to describe a specific phenomenon or problem, adopting the form questionnaire being the main source in collecting data and preparing for this. Based on the program of the Statistical Package of Social Sciences (SPSS 26) to analyze the data and come up with the final research results to identify the opinions of the intended sample on the subject of research, and the questionnaire of (20) paragraphs included the search variable, and was
... Show More