This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Arab Islamic environment raises so many issues and problems.
A series of Schiff bases linked to phthalimidyl phenyl sulfonate moiety have been synthesized via multistep synthesis. The first step involved reaction of phthalic anhydride with aniline producing N-phenyl phthalamic acid which was subsequently dehydrated to the corresponding N-phenyl phthalimide via treatment with acetic anhydride and anhydrous sodium acetate. The synthesized imide was treated with chlorosulfonic acid in the third step producing 4-(N-phthalimidyl) phenyl sulfonyl chloride which was introduced in reaction with 4-hydroxy acetophenone in the fourth step producing 4-[4-(N-phthalimidyl) phenyl sulfonate] acetophenone and this in turn was introduced successfully in condensation reaction with various aromatic primary amines affor
... Show MoreThis study seeks to answer urgent questions about the role of new media that have emerged recently, such as the Internet and social networking sites and information services through mobile and others to increase awareness among young people, especially university students. during a field study that took place on a sample of students in the Department of Media at the University of Petra Kingdom of Jordan during the second semester in 2013 in the study the researcher finds increased attention and follow-up by young people for many of the world events and regional and local communities through exposure to a number of new media; in the forefront of the Internet and increase the level of awareness and interests young people do many of the eve
... Show MoreMessage in the tune of readers and denial to those who say infidelity tunes
Research revealed the most important things:
1 - that the sentence if the nominal manufacturing according to one of the main frames for the construction of the original sentence or the nucleus called the obstetric and called the nominal or actual.
2 - is not an element of denial. Some of them counted in the Acts the people of Basra are missing and some of them are counted conjunction Menem people of Kufa and promise of the tools of the exception and some of them promise to benefit neglected exile is not Flaaml have at this team.
- What precluding it have a characteristic which they enter the actual sentence and never let an impact on the act, and the intervention of the nominal sentence Fathol
أدوات الىفي الذاخلة على الجملة التحويلية الاسمي
this research aims at a number of objectives including Developing the tax examination process and raise its efficiency without relying on comprehensive examination method using some statistical methods in the tax examination and Discussing the most important concepts related to the statistical methods used in the tax examination and showing its importance and how they are applied. the research represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side Some statistical methods applied to the sample of the final accounts for the contracting company (limited) and the pharmaceutical industry (
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe inverse kinematics of redundant manipulators has infinite solutions by using conventional methods, so that, this work presents applicability of intelligent tool (artificial neural network ANN) for finding one desired solution from these solutions. The inverse analysis and trajectory planning of a three link redundant planar robot have been studied in this work using a proposed dual neural networks model (DNNM), which shows a predictable time decreasing in the training session. The effect of the number of the training sets on the DNNM output and the number of NN layers have been studied. Several trajectories have been implemented using point to point trajectory planning algorithm with DNNM and the result shows good accuracy of the end
... Show MoreHome Computer and Information Science 2009 Chapter The Stochastic Network Calculus Methodology Deah J. Kadhim, Saba Q. Jobbar, Wei Liu & Wenqing Cheng Chapter 568 Accesses 1 Citations Part of the Studies in Computational Intelligence book series (SCI,volume 208) Abstract The stochastic network calculus is an evolving new methodology for backlog and delay analysis of networks that can account for statistical multiplexing gain. This paper advances the stochastic network calculus by deriving a network service curve, which expresses the service given to a flow by the network as a whole in terms of a probabilistic bound. The presented network service curve permits the calculation of statistical end-to-end delay and backlog bounds for broad
... Show More