This paper critically looks at the studies that investigated the Social Network Sites in the Arab region asking whether they made a practical addition to the field of information and communication sciences or not. The study tried to lift the ambiguity of the variety of names, as well as the most important theoretical and methodological approaches used by these studies highlighting its scientific limitations. The research discussed the most important concepts used by these studies such as Interactivity, Citizen Journalism, Public Sphere, and Social Capital and showed the problems of using them because each concept comes out of a specific view to these websites. The importation of these concepts from a cultural and social context to an Arab Islamic environment raises so many issues and problems.
In this paper, a mathematical model is proposed and studied to describe the spread of shigellosis disease in the population community. We consider it divided into four classes namely: the 1st class consists of unaware susceptible individuals, 2nd class of infected individuals, 3rd class of aware susceptible individuals and 4th class are people carrying bacteria. The solution existence, uniqueness as well as bounded-ness are discussed for the shigellosis model proposed. Also, the stability analysis has been conducted for all possible equilibrium points. Finally the proposed model is studied numerically to prove the analytic results and discussing the effects of the external sources for dis
... Show More
It is easy to talk about democracy, but it is difficult to practice. We talk about postmodernism, but difficult to be embodied in the ground. Yet, the age of democracy and modernity at the same time prompted the researcher to try to find a media concept for it. It does not mean that this concept has not yet formed. But the rooting of democracy and the approaching of states and groups towards it, made it necessary to by studied again.
The relationship between democracy and the media has made them look like one concept. The existence of one is linked to the existence of the other. The reality is only a linguistic formulation, but the social and cultural aspect is related to democracy origin
... Show MoreThe present investigation aims to study the effect of heat treatment by quenching in different quenching media (salt water, water and oil) following by tempering on wear resistance of EN25 steel. EN25 steel is an alloy of medium carbon low alloy steel which is used for many applications requiring high tensile strength and wear resistance such as connecting rods, adapters and in power sectors extensively. The specimens are machined to 20 mm in length and 10 mm in diameter. This study is done by two stages: The first stage is done by austenitizing EN25 steel to 850 for 1 hr by quenching the specimens in three different quenching media and then tempered at 300 in air. While the second stage is performed by wear
... Show MoreFuzzy C-means (FCM) is a clustering method used for collecting similar data elements within the group according to specific measurements. Tabu is a heuristic algorithm. In this paper, Probabilistic Tabu Search for FCM implemented to find a global clustering based on the minimum value of the Fuzzy objective function. The experiments designed for different networks, and cluster’s number the results show the best performance based on the comparison that is done between the values of the objective function in the case of using standard FCM and Tabu-FCM, for the average of ten runs.
The present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of a
... Show MoreBis-anthraquinones with a unique molecular backbone, (+)-2,2’-epicytoskyrin A (epi) and (+)-1,1′-bislunatin (bis), was produced by endophytic fungi Diaporthe sp GNBP-10 associated with Gambir plant (Uncaria gambier). Epi and bis possess robust antimicrobial activity toward various pathogens. This study focus on knowing the optimum condition of epi and bis production from Diaporthe sp GNBP-10. A series of culture media with various nutrient compositions was investigated in epi and bis production. The content of epi and bis was determined by measuring the area under the curve from TLC-densitometric (scanner) experiment. The linear regression analysis was then applied to obtain the results. The optimi
... Show MoreCognitive stylistics is one discipline of applied linguistics that relies on the reader’s interpretation and inference of the meaning of the text depending on his background knowledge. It studies how the reader understands the text and mapping it with his real experiences (Jeffries and McIntyre,2010). The present study is a cognitive stylistic analysis of digital stories. Digital stories are short narratives made by a combination of different sorts of digital media such as pictures, audios and videos. These digital media are employed to tell stories about oneself, famous people, and important events. The analyzed stories are selected from “Daily Yahoo Stories” and are analyzed according to Lakoff (1993) approach, The analysis investig
... Show MoreThe Pulse Coupled Oscillator (PCO) has attracted substantial attention and widely used in wireless sensor networks (WSNs), where it utilizes firefly synchronization to attract mating partners, similar to artificial occurrences that mimic natural phenomena. However, the PCO model might not be applicable for simultaneous transmission and data reception because of energy constraints. Thus, an energy-efficient pulse coupled oscillator (EEPCO) has been proposed, which employs the self-organizing method by combining biologically and non-biologically inspired network systems and has proven to reduce the transmission delay and energy consumption of sensor nodes. However, the EEPCO method has only been experimented in attack-free networks without
... Show MoreMobile Ad hoc Networks (MANETs) is a wireless technology that plays an important role in several modern applications which include military, civil, health and real-time applications. Providing Quality of Service (QoS) for this application with network characterized by node mobility, infrastructure-less, limitation resource is a critical issue and takes greater attention. However, transport protocols effected influential on the performance of MANET application. This study provides an analysis and evaluation of the performance for TFRC, UDP and TCP transport protocols in MANET environment. In order to achieve high accuracy results, the three transport protocols are implemented and simulated with four different network topology which are 5, 10
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show More