From a medical perspective, autoimmunity reflects the abnormal behaviour of a human being. This state is shaped when the defense of an organism betrays its own tissues. Allegedly, the immune system should protect the body against attacking cells. When an autoimmune disease attacks, it results in perilous actions like self-destruction. However, from a psychological perspective, the French philosopher Jacques Derrida (1930-2004) explains that autoimmunity harms both the self and the other. As a result, the organ disarms the betraying cells, as the immune system cannot provide necessary protection. From a literary perspective, Derrida has termed autoimmunity as deconstruction for almost forty years. Autoimmunity starts with the stage of a norm
... Show MoreSewer network is one of the important utilities in modern cities which discharge the sewage from all facilities. The increase of population numbers consequently leads to the increase in water consumption; hence waste water generation. Sewer networks work is very expensive and need to be designed accurately. Thus construction effective sewer network system with minimum cost is very necessary to handle waste water generation.
In this study trunk mains networks design was applied which connect the pump stations together by underground pipes for too long distances. They usually have large diameters with varying depths which consequently need excavations and gathering from pump stations and transport the sewage
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreMany people, especially among the youth or scholars, wonder about the position of Islam or the scholars of faith on the terminology used by scholars of theology in a certain period of time, and then circulated by people throughout the times and to the present day, such as the terms (the old, the maker, the updated, the cause and the cause) and so on, and this What I felt myself while teaching this subject from some of the students, some of whom consider it blasphemy, and some of them consider it an innovation of speech, and so there were many questions about this subject, which led me to write and research it, after relying on God Almighty, although the research is not long due to the nature of This topic on the one hand, and because I d
... Show MorePortable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail, appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls, intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu
... Show MoreBeen Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
The current study aimed to reveal the role of the high school (boys) in the Governorate of Qurayyat (KSA) in promoting intellectual security of students, and whether there were differences in the estimates of the study sample due to the variables; the current position, academic qualification, teaching specialization and years of experience. This study was conducted by applying the analytical descriptive method, and used questionnaire as a tool for data collection. The survey consisted of (44) ite
... Show MoreCurrent research aims to find out:
- Effect of using the active learning in the achievement of third grade intermediate students in mathematics.
- Effect of using of active learning in the tendency towards the study of mathematics for students of third grade intermediate.
In order to achieve the goals of the research, the researcher formulated the following two hypotheses null:
- There is no difference statistically significant at the level of significance (0.05) between two average of degrees to achievement
The purpose of this study is to assess the level of computer literacy of the students at AlQuds open university in Tulkarm Branch. The study investigates the effects of the variables of gender, specialization, academic level, owning a personal computer, internet communication, and own an email account on the level of computer literacy. A test of computer literacy was constructed by the researchers consisting of (37) multiple choice items with a reliability rate (0.85). The study population consisted of (4100) students, while the sample contained (352) students. The study revealed that the level of computer literacy of the students at AlQuds Open University in Tulkarm Branch was (66.2 %) which is educationally acceptable. It also
... Show MoreThe theory of the psychologist’s Piaget states that man passes through four stages; other says that mankind passes through five. At each stage, human learn new characteristics, values, skills, and cultures from different environment that differ from one society to another. Therefore, the cultures of societies vary according to the diversity of the environments. These environments also vary depending on the circumstances surrounding them, e.g., in war environment, the individual learns what he does not learn from living in safe environment. As the environment changes, the communicative message also changes. This message is subject to person, groups, organizations and parties and directed to a diverse audience in its orientations and bel
... Show More