Arab Food's Security
The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreUnited Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.
This study aimed at identifying the effect of violence on speech disorders concerning Arab Broadcasting . Language is a pot of thought and a mirror of human civilization and communication tool, but the Arabic language is suffering a lot of extraneous terms them, particularly through the media. This study attempts to answer the following question: Is the phenomenon of linguistic duality in the Media reflected negatively on the rules of the classical language? The study deals with the explanation and interpretation of the phenomenon that has become slang exist in our Media More. And the study suggests re- consideration of the value in the Media ,hence the problem will be resolved.
The study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (
Nations witnessed since its existence a state of wills conflict as a result of the intersection and intertwining of interests, through which it sought to achieve its goals and objectives, and this has often led to direct military conflicts and countless wars, and witnessed the entry into global wars in which humanity lost millions of lives and losses .Despite the great changes in the international arena, especially in recent decades, the conflict of wills has not ceased, although some of its features and forms have changed, and it has become more complicated after the withdrawal of this conflict to international organizations and bodies, including the Security Council. It is mandated under the Charter of the United Nations to wor
... Show MoreA steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
The study discusses ''The Security Intellectual Proposals of the Paris and the Welsh Schools'', which are considered one of the most important contemporary European monetary schools that emerged in the nineties of the twentieth century, and how did it approach the concept of security, criticizing the traditional trend that prevailed during the Cold War period regarding limiting the concept of security to the state or to the military aspect (National Security), and an attempt to expand the concept to economic, social and environmental dimensions, as well as political and military dimensions. The most important proposals that the Wales School provided are “Security as an emancipation policy”, “ individual security”, and “The ro
... Show MoreThe international system that established the United Nations after the end of the Second World War witnessed many changes. These changes overshadowed the nature of the work of the international organization, especially its first and most important executive organ (the Security Council). This has sometimes weakened and dulled the Security Council's role in performing the tasks stipulated in the Charter of the Organization, which has led the Organization itself to work on reforms within it in general and to seek reforms in the Security Council in particular. Academic and advisory efforts were made to submit proposals for amendment to be reflected on the Council's performance effectiveness.
The impact of Jurisprudence Rules in Addressing Contemporary security Challenges
Islamic jurisprudence is related to various fields of knowledge, as it is a science of great value, great in impact, and among the most prominent features of jurisprudence comes the jurisprudence rules. It regulates the principles of the doctrine for the jurist. Therefore, the main this research focuses on (the impact of jurisprudence rules in addressing contemporary security challenges). It is the relationship between jurisprudence rules and achieving security. Its fruit would be a statement of the distinguished impact of jurisprudence rules on the stability of the country, and its leading role in maintaining, strengthening, and pre
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show More