(January 25, 2011) represented a real opportunity to bring about fundamental changes in Egyptian foreign policy and to start a new phase that would cut off all the negative and problematic aspects of Egyptian politics in the period before the revolution. Through the employment of Egypt's huge balance and the role of historical is a civilization rooted in the roots of thousands of years and Islamic reference represented over more than a thousand years the Islamic medium of religion in the start of vision and tools to achieve the Egyptian national interest, and safeguarding Egyptian national security in its comprehensive sense. The research attempts to answer a central question: Is there a role for Egyptian soft power in the Islamic world in general and in the Mediterranean region in particular? In the answer to the above question, the research will provide a basic hypothesis: "Egyptian soft power has a role and influence in the Islamic world in general and in the Middle East in particular, but the effectiveness of this role and influence varied according to the different tools and times, and the reflection on the ground." The research is based on several approaches to achieve the desired results. The analytical approach to the contents of the Egyptian discourse will be relied upon, which helped to gain insight into the nature of Egyptian foreign policy and its position on the use of soft power. And adopted a comparative approach to demonstrate Egypt's use of solid power and its use of soft power in the Middle East region. Keywords: employment strategy, soft power, January 25 events in Egypt, techno-information revolution, diplomacy, Egyptian foreign policy.
The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreBackground: The early detection of oral cancers gives the greatest chance of curing and the delay in presentation has a significant impact on the associated morbidity and mortality. The lack of general dental practitioners (GDP) knowledge in early cancer detection has been shown to contribute to delays in referral and treatment. The aim of this study was to investigate the oral cancer awareness among a group of GDP by assessing their knowledge of detection and prevention of oral cancer. Materials and methods: A questionnaire based study was designed. The questionnaire was delivered to 200 GDP assessing oral examination method, knowledge of oral cancer risk factors, clinical appearance and the most common site, point of referral and requests
... Show MoreThis study was designed to investing the drug prescribing pattern which is the important point in the rational or irrational use of drugs among patients dispensing their prescriptions from the private pharmacies in Maysan governorate, Iraq for a period of 1 month. The data collected from prescriptions were calculated and analyzed according to the WHO prescribing guidelines. The data showed that the mean of drugs included in single prescription was 3.4, and 12% of prescribed drugs were written as generic names; moreover, the percentage of antibiotics, corticosteroids and anxiolytics were 33.3%, 11.4% and 23.8% respectively. Those results indicate the irrational use of drugs when compared with the world health organization standard values
... Show MoreThis research was carried out in quail in the laboratory of histopathology diseases during four months. The objectives of this study was to detecting the effects of the addition of the alcohol extract of ginger to ovary tissue of quail. The two groups of birds were in almost similar weights and were placed in cages. Each group consisted of 8 quails. The first group (control group) fed on regular feeding without adding alcoholic extract of ginger. The second group (treated group) fed on the same normal food after adding the alcohol extract of ginger at a concentration of 300 mg / kg. The results indicated that ginger have positive effects on folliculogenesis.
Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA) and received signal strength (RSS) are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through tha
... Show MoreDrug –induced nephrotoxicity is an important cause of renal failure. Aminoglycoside antibiotics, such as amikacin, which causes ototoxicity and nephrtotoxicity as a main side effects, this is focused on the use of natural materials as antioxidants against the toxic oxidative action that exert a cell damaging effect. The most important one of these materials is the honey. The aim of this work is to evaluate the antioxidant effects of honey against amikacin – induced nephrotoxicity.18 albino rats divided into 3 groups (6 rats per each group), group 1 received I.P daily dose of normal saline (control), group 2 received (35 mg/kg/day) I.P dose of amikacin ,and group 3 received (35mg/kg/day) of amikacin I.P dose in combina
... Show MoreThe danger of the attacks of 9/11 in America, mainly on the WorldTrade Center at Ground Zero, had brought America into a position thatnever seen before. People who lived there faced a historical calamity marked a turning point in history and a beginning of a new era. Thepaper examines the behavior of traumatized individuals in relation tosociety that trauma involves both. The socio cultural approach willachieve the goal. It studied the responses of the individuals to the event and the motives behind these reactions. Don DeLillo, a member of apost 9/11 group of writers, an American novelist of Italian origin, through his portrayal of the characters, tries to present a vivid image t
... Show MoreRisk factors can be considered unique in construction projects, especially in tendering phase. This research is directed to recognize and evaluate the importance of critical risk factors in the tendering phase related to Iraq’s construction project. As a rule, construction projects are impacted by risk factors throughout the project life cycle; without identifying and allocating these risk factors, the project cannot succeed. In this paper, the open and closed questionnaires are used to categorize the critical risk factors in tendering phase. Research aims to recognize the factors that influence the success of tendering phase, to determine the correct response to the risk’s factors in this research article, (IBM, SPSS, V23) package has
... Show More