Preferred Language
Articles
/
BhjIbpYBVTCNdQwC2ISn
Strategies of Israeli National Security towards Syrian Border Cities after 2011 (Quneitra, Swayda, and Daraa)
...Show More Authors

Although Israel's national security strategy, shaped by Ben Gurion in the 1950s, has remained steadfast, Israeli leaders have been keen to adapt and change some of its means and tools to maintain its national security. These changes were a response and adaptation to the complex and geostrategic transformations in the region since the end of the cold war. Traditional challenges to Israel's national security have declined as unconventional challenges have increased. This shift has adversely affected the efficiency and effectiveness of Israel's national security strategies. It has become necessary for Israel to confront regional actions taken by minor states and regional actors that have ensured the accumulation of its military capabilities. Meanwhile, sociopolitical values in Israeli society have undergone several changes since 2011, not to mention the continuing conflict with the Palestinians. This study, therefore, aims to elaborate on the concept of national security, differentiate national security from similar concepts, and identify the threats to Israel's national security, represented by challenges arising from actions without states in the Syrian border areas, namely Quneitra, Suwayda and Daraa. Also, this study demystifies the aspects of Israel's strategies to address these challenges after 2011. Thus, this study draws on three key border cities, Quneitra, Swayda, and Daraa, which are vital parts of Syria.

View Publication
Publication Date
Mon Oct 01 2012
Journal Name
Al–bahith Al–a'alami
The Arab Blogosphere and the Strategies of Self-Building and Diary
...Show More Authors

Basically, media studies focused on the important role of the blogs in boosting the democratic process in the Arab States. Blogs also worked on creating an alternative media for the public that maintained freedom of expression. However, media studies ignored the status of the blogs in the social and cultural fields.
The current study tries to tackle the socio-cultural dimensions of the blogs by means of showing how the blogs construct the self. The researcher is going to conduct interviews with the bloggers. He will also carry out a semiotic analysis that may reveal the strategies used by the bloggers. Besides, he tries to identify the realistic and traditional frames in which the social relationships are buil

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Geophysical Research: Space Physics
Properties of the HPS‐ICME‐CIR Interaction Event of 9–10 September 2011
...Show More Authors
Abstract<p>During 9–10 September 2011 the ACE, Wind, and SOHO spacecraft measured the complex interaction between an interplanetary coronal mass ejection (ICME) and a corotating interaction region (CIR) associated with the heliospheric sector boundary. Except for a few short periods, the suprathermal electrons are unidirectional, suggesting that the ICME magnetic field has opened through interchange reconnection. Signatures of interaction are distributed throughout the event suggesting that the structures have become entangled or embedded. Since the ICME speed is relatively low, the strong forward shock must be caused by the ICME‐CIR interaction. Other interesting features are the upstream heating flux disc</p> ... Show More
View Publication
Scopus (6)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Thu Jan 12 2023
Journal Name
Journal Of The College Of Basic Education
Knowledge and awareness towards Cryptosporidiosis in Baghdad
...Show More Authors

تم تقييم المعرفة والوعي تجاه داء الكريبتوسبوريديوس في هذه الدراسة خلال الفترة من أبريل 2009 حتى يونيو 2011 ، من بين 188 شخصًا من كلا الجنسين تم تقسيمهم إلى مجموعات ومجموعات فرعية مختلفة على النحو التالي المجموعة 1: تشمل 48 طبيبًا من مختلف المستشفيات والرعاية الصحية الأولية مراكز في بغداد تم تقسيم هذه المجموعة إلى 30 طبيبًا متخصصًا و 18 طبيبًا ممارسًا عامًا. المجموعة الثانية: تضم 45 عضو هيئة تدريس من قسم الأحياء ، قس

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Knowledge And Awareness Towards Cryptosporidiosis In Baghdad
Knowledge and awareness towards Cryptosporidiosis in Baghdad
...Show More Authors

Knowledge and awareness towards cryptosporidiosis were assessed in this study during the period from April 2009 till June 2011, among 188 person of both gender which were divided in different groups and sub groups as following Group 1: include 48 physician from different hospitals and primary health care centers in Baghdad this group were sub divided into 30 Specialist doctors and 18 General practitioners doctors. Group 2 : include 45 teaching staff member from Biology department , Biotechnology department in University of Baghdad and AL-Nahrain University as well as teaching staff member from the college of medicine – University of Baghdad and University of Mustansiryah, this group were sub divided into 9 Ph.D and 36 M.Sc. + B.Sc. me

... Show More
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 01 2025
Journal Name
مجلة العلوم السياسية
توظيف الدبلوماسية الرقمية في السياسة الخارجية بعد العام 2011:الامارات انموذجا
...Show More Authors

توضح الدراسة اثر التطور التكنولوجي الحديث على العلاقات الدولية، وظهور مصطلح (الدبلوماسية الرقمية) التي أصبحت اتجاهاً مستحدثاً في عصر يتسم بالسرعة والتواصل عبر (الإنترنت)، وأتاحت للدول والمنظمات الدولية استخدام التكنولوجيا، لتعزيز عمليات التواصل وبناء العلاقات الدولية، اذ شكلت الدبلوماسية الرقمية طفرة في التفاعل والتواصل بين الدول مع بعضها البعض سواءً في تبادل الرؤى والمواقف السياسية أو في إدارة الأز

... Show More
View Publication
Crossref
Publication Date
Wed Mar 13 2019
Journal Name
Political Sciences Journal
Community composition of India and its impact on national unity
...Show More Authors

India is today the largest democratic state in the Third World and has been able to maintain its national unity in the near future. The history of Indian civilization is more than 5,000 years old. It has achieved its heritage, culture, philosophy, traditions, national unity and unity and has taken its place among nations seeking progress and progress. Which are still visible to the present day, because of their history of civilization and achievements, and the fusion of cultures of invading peoples over the centuries with the culture of diverse Indian society, but despite being a secular state, Has put into place through its governments various forms of exclusion and marginalization towards the people of India, especially Muslims, and th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimating and Analyzing Food Security Indicators in Selected Arab Countries for the Period (1996 - 2012)
...Show More Authors

        The study hypothesize that the majority of Arab countries  show a poor agricultural economic efficiency which resulted in a weak productive capacity of wheat in the face of the demand, which in turn led to the fluctuation of the rate of self-sufficiency and thus increase the size of the food gap. The study aims at estimating and analyzing the food security indicators for their importance in shaping the Arabic agricultural policy, which aims to achieve food security through domestic production and reduce the import of food to less possible extent. Some of the most important results reached by the study were that the increase in the amount of consumption of wheat in the countries of t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Algerian Popular National Army ( 1962 – 19678 ): The Algerian Popular National Army ( 1962 – 19678 )
...Show More Authors

Abstract :
Algeria had lacked the appropriate size of forces that achieved to it the
military balance to face the foreign threats or to achieve its security
.Consequently , this demanded Algeria to put a complete plan to reach the
appropriate size by forces . These Forces needed to be built according to the
following standards :-
- The national gool for Algeria and how to achieve it through the armed forces
.
- Specifying the size of threats with a kind of detail , the size of these threats
would be specified in the future in order to build its Force according to Future
Frames and limits .
- Developing the abilities of war manufacturing .
- Specifying the necessary Funds in the Future budgets that woul

... Show More
View Publication Preview PDF