This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the role of collectivistic culture in the Arab cultural context, where women may feel more scrutinized than men.
In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.
... Show MoreThe present research aims at identifying the impact of S.N.I.P.S strategy on the achievement of fifth grade students in natural geography
For the purpose of verifying the objective of the research, the researcher put the following zero hypothesis: There is no statistically significant difference at the level of (0.05) between the mean score of experimental group who study according to the (S.N.I.P.S) strategy, and the mean score of control group who study according to the traditional method in the achievement test.
In order to verify the validity of this null hypothesis, the researcher adopted the experimental method. Two groups of (60) fifth grade literary students were collecte
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreIn this research the effect of cooling rate and mold type on mechanical properties of the eutectic
and hypoeutectic (Al-Si) alloys has been studied. The alloys used in this research work were (Al- 12.6%Si
alloy) and (Al- 7%Si alloy).The two alloys have been melted and poured in two types of molds with
different cooling rates. One of them was a sand mold and the other was metal mold. Mechanical tests
(hardness, tensile test and impact test) were carried out on the specimens. Also the metallographic
examination was performed.
It has been found that the values of hardness for the alloys(Al-12.6%Si and Al-7%Si) which poured in
metal mold is greater than the values of hardness for the same alloy when it poured in a heated
Low- and medium-carbon structural steel components face random vibration and dynamic loads (like earthquakes) in many applications. Thus a modification to improve their mechanical properties, essentially damping properties, is required. The present study focuses on improving and developing these properties, significantly dampening properties, without losing the other mechanical properties. The specimens used in the present study are structural steel ribbed bar ISO 6935 subjected to heating temperatures of (850, 950, and 1050) ˚C, and cooling schemes of annealing, normalizing, sand, and quenching was selected. The damping properties of the specimens were measured experimentally with the area under the curve for the loadi
... Show MoreEvaluating the behavior of a ring foundation resting on multi-layered soil is one of the important issues facing civil engineers. Many researchers have studied the behavior of ring foundation rests on multi-layered soil with vertical loads acting on the foundation. In real life ring foundation can be subjected to both vertical and horizontal loads at the same time due to wind or the presence of soil. In this research, the behavior of ring footing subjected to inclined load has been studied using PLAXIS software. Furthermore, the effect of multi-layered soil has been simulated in the model. The results showed that both vertical and horizontal stresses are mainly affected when the inclination angle of the load exceeded 45 degrees with a reduc
... Show MoreBackground: Interleukine-2 is a multifunctional cytokine, considered a central regulator of host resistance against a variety of pathogens and has been recently demonstrated to exert an active role in the pathogenesis of periodontal diseases. The purpose of this study was to evaluate the effect of scaling and root planning on level of IL-2 in serum and saliva of patients with chronic generalized periodontitis, in relation to clinical parameters. Materials and Methods: A total of 50 subjects were enrolled, of which 25 had chronic generalized periodontitis and 25 periodontally healthy subjects as control. The clinical parameters included: gingival index, pocket probing depth, clinical attachment level and bleeding on probing. The level of
... Show MoreFinancial institutions, including banks, remain a major target for money launderers in order to transfer illegal funds to legitimate funds through limited internal audit procedures and external auditing.
The study is a study of the operations of money laundering and what can be done by the verification efforts when integrated in the fight against them, by analyzing the level of cooperative relationship and communication between them. To achieve the objectives of the study, a questionnaire prepared for this purpose was distributed to an appropriate sample of (60) auditors of the internal audit staff of the Central Bank of Iraq and the external auditors working in the Federal control foundation Accordingly , appropriate methods wer
... Show MoreTraffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho
... Show More