نحو تعزيز المشاركة السياسية للطالبات الجامعيات الفلسطينيات
This study aims to examine the sources of organizational power prevailing among the academic leaders at the University of Tabuk from the faculty members’ viewpoint. The purposes behind such an aim are: to reveal the level of administrative and technical institutional creativity, the nature of the relationship between the reality of organizational power and the level of institutional creativity, and to disclose statistically the significant differences between the averages of faculty members’ responses attributed to the demographic variables (gender, years of experience, academic degree). The study used the descriptive approach, both survey and correlational. A questionnaire was used to collect data from a simple random sample o
... Show MoreThe goal of this research to identify the effect of the probing questions in the collection of material literature with students of the Kurdish language department, to achieve the aim of the research, the researcher has chosen a sample from the students of third stage of the Kurdish language Department, Faculty of Education / Ibn Rushd as a field for the application of experiment.The number of sample reached (71) students divided into two groups represented two divisions of the experimental groups under study to the style of questions sounding by (35) students, and represented the other division of the control group, which studied in the way normal and by (36) students, as rewarded r
... Show MoreThe research aimed mainly to discover the effectiveness of the (PEOE) model in teaching science to develop the skills of generating and evaluating information and the emotional side of the scientific sense of the intermediate first grade students. An experimental approach with a quasi-experimental design called pre-test and post-test control design was used. The research sample consisted of (60) students, who were selected in a random cluster method, (30) students in the experimental group studied the unit "The Nature of Material" using the (PEOE) model, and (30) students in the control group studied according to the prevailing method of teaching. The research materials and tools were represented in: a teacher's guide for teaching the un
... Show MoreIt aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat
... Show MoreThe study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a poli
... Show MoreThe arrival of Russian President Vladimir Putin to power in the Russian Federation is an important factor in delineating a new approach to Russian policy towards regions that have great strategic importance affecting its national security. Therefore, NATO's progress eastward towards these regions prompts Russia to delineate a new strategy to confront this progress as well as preserving its control in the near neighboring regions represented by the countries of Eastern Europe, especially after the changes that occurred in those regions following the color revolutions that swept the region, such as the first application of this Russian policy in 2014, through the annexation of Crimea, and the latest military operations in Ukraine i
... Show MoreThe Russian foreign policy of the post-cold-war era faced dilemmas in the light of the international and regional realities of the disintegration of the Soviet Union and the formation of a new unipolar international order led by the United States of America. Thus, Russian foreign policy-making was divided over the nature of the foreign policy to be followed. The achievement of the Russian goals, especially as the objectives of Russian foreign policy have been set within the framework of trying to regain the status and leading role, as well as the establishment of some fundamental changes to be consistent with the new international situation of the post-one The Russian Federation has adopted in the sphere of its foreign policy to the vari
... Show MoreThe novel coronavirus 2019 (COVID-19) is a respiratory syndrome with similar traits to common pneumonia. This major pandemic has affected nations both socially and economically, disturbing everyday life and urging the scientific community to develop solutions for the diagnosis and prevention of COVID-19. Reverse transcriptase-polymerase chain reaction (RT–PCR) is the conventional approach used for detecting COVID-19. Nevertheless, the initial stage of the infection is less predictable in PCR tests, making early prediction challenging. A robust and alternative diagnostic method based on digital computerised technologies to support conventional methods would greatly help society. Therefore, this paper reviews recent research bas
... Show MoreIn recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T
... Show More