This study investigates self-perception and self-branding on Instagram among young Arab women in the UAE, focusing on how they curate, negotiate and perform their digital identities and whether their digital self-presentation in any way compromises their sense of authenticity. The study is based on 11 interviews with young women in the UAE, between the ages of 20 and 30, in addition to online observation to follow the participants’ activities on Instagram. The study demonstrates that while social and digital media platforms may play a role in “empowering” Arab women, women tend to set their boundaries of authenticity shaped according to their audience’s expectations and their in-groups. This confirms the role of collectivistic culture in the Arab cultural context, where women may feel more scrutinized than men.
The goals of endodontic preparation were to shape and clean the space of the root canal and remove microorganisms, affected dentin and pulp, the apical foramen and the canal curve should be protected from being transported during endodontic canal preparation. The aim of this study was to evaluate the curve straightening of curved root canals and apical transportation after preparation with four rotary systems. Forty mesial roots of the lower 1st molars teeth only the mesiobuccal canals were used, these roots were immersed into cold clear acrylic , the teeth roots divided into four groups according to rotary system used for preparation of the canals (ten roots for each group):. group I: ProTaper Next rotary system, group II: IRaCe Plus rotar
... Show MoreIn this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a
... Show MoreThe current research tries to identify the employment of the digital technology in the formation of the theatrical show space. The researcher started with the significant importance of the digital technology and its workings in the formation of the contemporary theatrical show being a modern, artistic, aesthetic, intellectual and technological means to convey the topic in an integrated manner, as well as its close connection with the creative directive vision and the creative designing vision. It provides a variety of models of numerous implications in terms of transmission and advancement of the relationships represented by clarifying the scenography and dramatic conflict forms according to the numerous motivations of the directo
... Show MoreThis research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show MoreIn this work, zinc oxide nanoparticles (ZnONPs) and sawdust/epoxy composite (20:80) were mixed using a simple molding method with different ZnONPs concentrations of (0.1, 0.3, 0.5, 0.7, and 1.0 %). The samples of the nanocomposites were characterized by the Scanning Electron Microscopy (SEM) technique to demonstrate the homogeneity of the prepared ZnONPs/nanocomposites. The photocatalytic activity of the samples was examined using the methylene blue (MB) dye as a pollutant solution, through evaluation of the efficiency of the prepared compound in the treatment of organic pollutants under illumination by sunlight. The photocatalytic results showed that after 240 minutes of exposure to sunlight, the sample prepared using (0.5 vol.% of ZnON
... Show MoreThis study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information And data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a role i
... Show Moreخضعت العلاقة بين موقف الحساب الجاري, سواء اكان بحالة عجز ام فائض, وسعر الصرف, اكان بحالة انخفاض او ارتفاع, لجدل واسع بين اوساط الاقتصاديين بشأن هذه العلاقة واتجاهاتها.
الا ان الاعتماد المتزايد لبعض الدول على المستثمرين الاجانب لتمويل العجز في حساباتها الجارية قد يصطدم بعدم رغبة هولاء المستثمرون في الاستمرار باقتناء موجودات معينة مقوِِِِِِِِمة بعملات تلك الدول. وتنشأ الطامة الكبرى لاقتصاد
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.
The intellectual property of digital documents has been protected by using many methods of digital watermarking. Digital documents have been so much of advantages over print documents. Digital documents are less expensive and easy to store, transport, and searched compared to traditional print documents. But it has its owner limitation too. A simple image editor can be used to modify and make a forged document. Digital documents can be tampered easily. In order to utilize the whole benefits of digital document, these limitations have to overcome these limitations by embedding some text, logo sequence that identifies the owner of the document..
In this research LSB technique has been used
... Show More