Arab Food's Security
The Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti
... Show MoreThe modern nation state, by virtue of its institutional nature, is divided into political and non-political institutions according to their respective jurisdictions. It is natural for non-political institutions to perform their functions under the control of the political establishment, for two reasons: first, Second: Ensuring the achievement of cooperation, harmony and integration between these different institutions in serving the stability of the society and its continuity and achieving its supreme objectives. The location of the military establishment is part of the non-political institutions of the state, since it carries out a non-political function that is based on defending the homeland against any threats that may threaten its s
... Show MorePrecious stones enjoyed a high level of goodwill among people in the ancient world as they were considered as important source of their jewels, an effective medicine to cure their diseases and spiritual healing that bring optimism and happiness by holding it especially to those who believe their effects on the Human.
Arab woman didn't abandon the interests of the neighbor civilizations as she coped with them and took what she desired of jewelry like pearls, sapphires and emerald. She used some of precious stones like antimony, magnet and bezoar in prescriptions for curing diseases and injuries. She also used turquoise, onyx and cat eye stone to prevent envy and Exorcism purposes as she thought that these stones could protect her from
United Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.
The study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (
The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreArabic calligraphy is one of the greatest achievements of Islamic art. The visual form of Arabic calligraphy is the primary means of presenting ideas and messages for expressive communication in Arabic typefaces. Emerging computer technology with calligraphy is essential for effective visual designs; however, traditional typefaces are insufficient in number and quality to fulfill the requirements of the current Saudi industry. Thus, this research investigates the processes followed by graphic designers to create modern Arabic type designs inspired by Arabic calligraphy, and presents the characteristics of Arabic calligraphy. The research implemented a mixed experimental and descriptive method, exploring 10 typefaces designed by professio
... Show MoreTechnological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.