This research is intended to high light the uses of political content in foreign Arabic / speaking websites, such as “ CNN “ and” Euro News“, The research problem stems from the main question: What is the nature of the use of the websites in the political content provided through them? A set of sub-questions that give the research aspects and aims to achieve a set of objectives , including the identification of topics that included , the political content provided through , the sample sites during the time period for analysis and determine that the study uses descriptive research based on the discovery of the researcher, describing it accurately and defining the relations between the components.
The research conducted the descriptive survey method, it is an analytical approach, which provides access to the required data ,and information that provided answers to research questions, the research methodology required the use of content analysis tool , which provided analytical political content provided through the sample sites to identify the inclination which was used in these content was divided into three topics dealt with the first methodological framework of the research dealt with the second types of inclinations used in the political implications of the websites while the third sections specialized in the results of the analytical study and reached the search to a set of conclusions , the most prominent of which is the following , focusing on the contents of the political implications presented in both locations depending in the first place on the situation in the Arab region , especially the Qatari crisis with the Gulf states and the adoption of both locations of the three basic types of inclinations implicated in the political content presented through them , namely , rationality and intimidation with clear contrast in their use with in each of the site sample , as the site of CNN has relied primarily on emotional inclinations that address the conscience while the site of Euro News clearly based on intimidation, zero 0
Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra
... Show MoreThe research seeks to know the social loafing of kindergarten teachers and their relation to personality traits. In order to achieve the research objectives, the researcher constructed the social loafing scale, which she applied to kindergarten teachers. The scale consists of (22) paragraphs. It has good credibility and stability. The coefficient of stability (85.0) was the retest method and (81.0) Alpha Cronbach equation. In addition, the researcher has adopted (Raymond Cattel) personality traits scale, which has been adapted to the Arab environment (Abdel Rahman and Abu Abada,1998), The scale consists of (39) paragraphs, and enjoys the apparent honesty. The measure of social loafing and the measure of personality traits was applied to
... Show MoreYouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreCryptography steganography is a practical tool for data security. Hybridization of the cryptography with steganography can provide more security by taking advantage of each technique. This work proposes a method for improving the crypto-stego method by utilizing the proposed dictionary method to modified ciphertext. After that, the modified encrypt ciphertext id was hidden in the text by using the proposed method. For cryptography, an Advanced Encryption Standard (AES) was utilized to encrypt the message. The AES employed a 128bit block size and 256bit key size. The ciphertext characters were then replaced by the characters identified by a dictionary list. The dictionary is time-dependent, where each of the equivalent words shift based o
... Show MoreThe optimum conditions for the production of neutral protease from local strain Aspergillus niger var carbonarius by solid – state fermentation system (Wheat bran) moisted with 0.2 M phosphate buffer (PH7.0) . the hydration ratio was 1:5 (V:W) . the concentration of inoculum was 1×106 spores per 10 gram of solid materials , initial P H 6.5 and 96 hours of incubation period at 30? C .the enzyme activity was 1300 unit / ml and specific activity was 1550 unit / mg protein .
A New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show More