This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the role of collectivistic culture in the Arab cultural context, where women may feel more scrutinized than men.
This work includes design, implementation and testing of a microcontroller – based spectrum analyzer system. Both hardware and software structures are built to verify the main functions that are required by such system. Their design utilizes the permissible and available tools to achieve the main functions of the system in such a way to be modularly permitting any adaptation for a specific changing in the application environment. The analysis technique, mainly, depends on the Fourier analysis based methods of spectral analysis with the necessary required preconditioning processes. The software required for waveform analysis has been prepared. The spectrum of the waveform has been displayed, and the instrument accuracy has been checked.
... Show Moreالطائفية وتداعياتها على بناء الدولة العراقية المعاصرة
The globalization concept is regarded one of the modern concept which had seen in the last time while it hadn’t occur now only, but it had seen clearly with the technology &information revolution beside the quick development in the communication net which had made the world like a small village .
Since accounting is regarded business language based on integrated theoretical framework consists of many connected objective & rules which led to consistent accounting standards .
So with this development there is a clear need to consolidate the concepts , policies ,and applications which the companies use it in treating its financial events .
The aim of the current research is to explore the health, psychological, and social implications of Internet addiction. Internet addiction is a new type of addiction, which negatively affects an individual’s life and creates social problems, psychological and nervous disorders. The research is divided into three sections: The first section is devoted to the definition of the research and includes the research problem, its importance in addition to the objectives, and the search terms were defined in it. The second section included the concept of addiction on the Internet and the causes, symptoms of addiction, forms, and previous studies were reviewed. As for the third topic, it deals with the theories explaining Internet addiction and
... Show MoreConcealment of the Offenders:
Its Conceptions, Evidence, Objectives, Criteria
This study discusses the concealment of the offenders, but also emphasize the importance of clarifying this concept. Furthermore, it differentiates between this concept and other relevant concepts. Moreover, this study explains that the ruling of the concealment of the offenders is required by sharia. This is evident by many proofs of the Quran and the Sunnah in addition to being in line with the sharia’s objectives.
Additionally, the study mentions several advantages to the concealment of an offender and the disadvantages of reporting an offender. Examples include ensuring the Islamic community cohesion, encouraging offe
... Show Moreان التحول في الحياة الاقتصادية الناتج عن التقدم التكنولوجي وتقنية المعلومات في مجالات الفضاء والتقدم في الاتصالات السلكية واللاسلكية والالكترونيات الدقيقة مكنت الشركات من ارسال كميات هائلة من البيانات بتكاليف منخفضة.
وان انتشار الشركات متعددة الجنسبة والتي سعت لتحقيق السيطرة على اقتصاديات العالم من خلال فروعها المنتشرة فتحتاج الى نظم للانتاج والتكاليف ونظم للمعلومات الادارية والمحاس
... Show MoreThe national anthem is one of the most eloquent communicative discourses that the language establishes due to its deep impact on the audience and forms a broad mass base that interacts with the chanting of the national anthem. Moreover, communication is the cornerstone in building social and educational relations. From this point of view, the communicative approach studies language in the communicative context and its six important functions identified by linguist Roman Jacobson. The official UAE national anthem is considered as a model for expressing the enthusiasm of the Emirati Arab public, who is proud of their Arabism, loyalty and love of the homeland, because of the expressions that this anthem carries, urging the public to
... Show MoreNowadays, university education stands in front of both students who feel they are weak and teachers who are addicted to using traditional and dependent teaching. This has led to have negative repercussions on the learner from different aspects, including the mental aspect and the academic achievement process. Therefore, the present research is concerned with finding a new teaching method that adopts the motivation by the fear of failure technique. Thus, the study aims to examine the effect of adopting this method on students’ academic achievement. To achieve this aim, an experimental method was used, and an achievement test was built for the curriculum material of level two students. The pretest test was applied on 17 male and female s
... Show Morein recent years cryptography has played a big role especially in computer science for information security block cipher and public
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.