This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Arab Islamic environment raises so many issues and problems.
Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreIn the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H
... Show MoreIn the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo
... Show MoreThe recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli
... Show MoreThe relationship between pollution levels in river sediment and fluctuating asymmetry of resident silurid fish species,
This is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo
The objective of the research is to evaluate the risk management practices of the variables (risk management structure, risk management methods, key components of risk management) and their relation to the principled behavior of managers behavior(innovation, proactive, risk acceptance) By adopting the questionnaire as a main tool in collecting data from managers in the National and raq insurance companies of (50) officials Department manager, department administrator, unit administrator, and analyzed their answers using the SPSS In calculating arithmetic mean, standard deviation, percentage weight and simple correlation coefficient. The most prominent conclusions were:1.There is a positive trend in the sample in both companies and a high
... Show More