This study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present the Palestinian perspective to a global audience, while the central objective is to debunk the false Israeli narrative, which relies heavily on targeted propaganda.
Dye-sensitized solar cells (DSSC) create imitation photosynthesis by using chemical reactions to produce electricity from sunlight. DSSC has been pursued in numerous studies due to its capability to achieve efficiencies of up to 15% with artificial photosensitizer in diffuse light. However, artificial photosensitizers present a limitation because of the complex processing of metal compound. Therefore, various types of sensitizers were developed and synthesized to surpass the artificial sensitizer performances such as natural sensitizers from bio-based materials including plants, due to simple processing techniques and low environmental impact. Thus, this study examines the potential and properties of natural sensitizers from the was
... Show MoreThis work discusses the beginning of fractional calculus and how the Sumudu and Elzaki transforms are applied to fractional derivatives. This approach combines a double Sumudu-Elzaki transform strategy to discover analytic solutions to space-time fractional partial differential equations in Mittag-Leffler functions subject to initial and boundary conditions. Where this method gets closer and closer to the correct answer, and the technique's efficacy is demonstrated using numerical examples performed with Matlab R2015a.
A series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThe azo ligand obtained from the diazotization reaction of 2-aminobenzothiazole and 4- nitroaniline yielded a novel series of complexes with Co(II), Ni(II), Cu(II), and Zn(II) ions. The complexes were investigated using spectral techniques such as UV-Vis, FT-IR, 1H and 13C NMR spectroscopic analyses, LC-MS and atomic absorption spectrometry, electrical conductivity, and magnetic susceptibility. The molar ratio of the synthesized compounds was determined using the ligand exchange ratio, which revealed the metal-ligand ratios in the isolated complexes were 1:2. The synthesized complexes were tested for antimicrobial activity against S. aureus, E. coli, C. albicans, and C. tropicalis bacterial species. Additionally, their binding affinities we
... Show More