Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.
Recently, biometric technologies are used widely due to their improved security that decreases cases of deception and theft. The biometric technologies use physical features and characters in the identification of individuals. The most common biometric technologies are: Iris, voice, fingerprint, handwriting and hand print. In this paper, two biometric recognition technologies are analyzed and compared, which are the iris and sound recognition techniques. The iris recognition technique recognizes persons by analyzing the main patterns in the iris structure, while the sound recognition technique identifies individuals depending on their unique voice characteristics or as called voice print. The comparison results show that the resul
... Show MoreAbstract
This study aims at investigating the relationship between mindfulness and academic self-efficacy among Northern Border University students. To achieve this objective, the researcher adopted the correlative survey method for (97) students. For data collection, the researcher developed a mindfulness scale consisting of (42) items divided into seven topics, each one consisting of six items. The researcher developed an academic self-efficacy scale consisting of (20) items, adopting a five-point Likert scale. The results showed that there is a high level of mindfulness among students at the level of the seven units which formed the mindfulness scale; the conscious thinking unit showed the highest mean value o
... Show Moreتعد الحروب أحد أخطر التهديدات في النظام العالمي; فهي تعد خرقا للقوانين والاعراف الدولية، والمبادئ الإنسانية، و من هنا تأتي دراسة أهمية موضوعنا الموسوم بـ (الاحتمالات المستقبلية للحرب الروسية – الأوكرانية و مدى انعكاسها على أمن دول شرق أوربا بعد العام 2022 ،)اذ يرتكز هذا البحث على دراسة واستعراض الاحتمالات المستقبلية )السيناريوهات) للحرب الروسية – الأوكرانية، والتي شنت من الحكومة الروسية بقيادة الرئيس الروس
... Show MoreGiven the importance of ecology and its entry into various fields in general and the urban environment particularly; ecological cities take wide ranges of application at multiple regional and global levels. However, it repeatedly noted that there was a state of cognitive confusion and overlapping in the term ecology comes from the diversity of implementation within several disciplines. Architects, designers, and planners have instilled biological development directly into the formal principles as well as the social structures of the ecological cities. Therefore, the research presents a rapid review of the most relevant areas that dealt with the ecological cities by research and analysis at various levels, from the concept and definition of
... Show MoreGiven the importance of ecology and its entry into various fields in general and the urban environment particularly; ecological cities take wide ranges of application at multiple regional and global levels. However, it repeatedly noted that there was a state of cognitive confusion and overlapping in the term ecology comes from the diversity of implementation within several disciplines. Architects, designers, and planners have instilled biological development directly into the formal principles as well as the social structures of the ecological cities. Therefore, the research presents a rapid review of the most relevant areas that dealt with the ecological cities by research and analys
HS Saeed, SS Abdul-Jabbar, SG Mohammed, EA Abed, HS Ibrahem, Solid State Technology, 2020
The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThis paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More