Preferred Language
Articles
/
jcopolicy-410
Constitutional amendments in the era of Justice and Development Party after 2002 (reality and ambition)
...Show More Authors

Abstrct The Turkish political system has undergone exceptional and unprecedented circumstances, represented by a series of security and political unrest that has cast its shadow over the Turkish state and regional and international challenges. It has never been a pretext or pretext for continuing the comprehensive reform process. The constitutional amendments of the 1982 Constitution, Justice and development, whether political, economic or social, is not a reaction to a difficult reality; it is a system of governance and a national option stemming from within. It promotes national unity and enshrines democracy and the concept of public rights and freedoms.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
The Phonological and Suggestive Rhythm in the Context of the Quranic Text: The Phonological and Suggestive Rhythm in the Context of the Quranic Text
...Show More Authors

Abstract
The perpetuity of the Quranic discourse required being suitable for all ages.
Accordingly, the method of the Glorious Quran a pre request for the conscious
investigation and realization in order to detect the core of the texts, as the Quranic
discourse is considered a general address for the humanity as a whole. For this
reason, the progress of the concerned studies neceiated that it should cope with the
current development in the age requirements and its cultural changes within ages.
The texts of the Glorious Quran lightened the human reason as being the
Creator’s miracle for it is characterized by certain merits that makes it different from

poetry and prose. It is a unique texture in its rheto

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
The use of metal in ancient Syria in the manufacture of jewelry (ornamental tools in the third and second millennium BC and the molds used in their manufacture)
...Show More Authors

 This research sheds light on the use of metal in the manufacture of jewelry, which is represented by ornamental tools in the period between the third and second millennium BC, in addition to the most important molds used in their manufacture. Man has been interested in metals since early ages, and was able to make tools that he uses in his daily life, especially jewelry. And the Syrian people got acquainted with the types of minerals, their characteristics, and how to deal with them. Minerals played an effective and prominent role in the economy of ancient Syria. Trade with those countries and secure their roads.

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (22)
Crossref (12)
Scopus Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
دار الاندلس للطباعة والنشر
أحمد عصمت عبد المجيد: نشاطه السياسي والدبلوماسي حتى عام 2001
...Show More Authors

يقدِّم هذا الكتاب دراسةً موسَّعة عن المسار الدبلوماسي والسياسي لأحمد عصمت عبد المجيد، أحد أبرز الفاعلين في تشكيل النظامين المصري والعربي المعاصِرَيْن خلال النصف الثاني من القرن العشرين، من خلال تتبُّع مسيرته منذ النشأة والتكوين العلمي في الإسكندرية وفرنسا، مرورًا بتدرّجه في السلك الدبلوماسي المصري، وصولًا إلى تولّيه منصب الأمين العام لجامعة الدول العربية بين عامي 1991 و2001. ولا يكتفي الكتاب بسرد السيرة الذا

... Show More
View Publication
Publication Date
Wed Jun 01 2016
Journal Name
مجلة العلوم السياسية
السياسة الخارجية الروسية حيال الخليج العربي لمرحلة مابعد عام 2001
...Show More Authors

واجهت السياسة الخارجية الروسية لمرحلة مابعد الحرب الباردة معضلات في ظل المعطيات الدولية والاقليمية المتمثلة في تفكك الاتحاد السوفيتي، وتشكل نسق النظام الدولي الجديد الاحادي القطبية بزعامة الولايات المتحدة الامريكية، لذا فقد انقسمت دائرة صنع القرار السياسي الخارجي الروسي حول طبيعة السياسة الخارجية الواجب اتباعها والتي من المفترض ان تحقق الاهداف الروسية، لاسيما ان اهداف السياسة الخارجية الروسية قد تحدد

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Views of Amadi and Gorgani In the metaphor in their books budget and mediation
...Show More Authors

The research revolves around the views of Al-Amadi and Al-Jurjani in the metaphors in their books, balancing Abu Tammam and Al-Bohtari, and mediation between Mutanabi and his opponents. And others whose poems were cited. One of the most important things we have reached is: the critics release the term metaphor to take sometimes and mean to take the meaning or steal it, and analyzed the evidence of metaphor as a rhetorical art in the light of what he heard about the former Arab poets, rejected the unusual metaphor out of use, and reclaimed the familiar metaphor. The research after submitted to the topics are: the first: Al-Amadi and his budget book, the second: Al-Jurjani and his book of mediation, and the third is divided into three dema

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
The protest movements in Sudan and their role in the political and social transformation
...Show More Authors

This study investigates the factors that led to the outbreak of protest movements in Sudan, since Sudan’s independence in 1956 until December 2018. The study aims to identify the role of protests in bringing about political and social transformations in Sudan, besides identifying the factors that help in the success or failure of the governments that resulted from those protests, with special emphasis on the challenges of the government of the 2018 revolution. The main results of the study reveal that the December 2018 protests are the largest in term of numbers, and witness huge participation of youth and women, and the slogans raised were national and comprehensive. However, the challenges that the transitional government is going th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Mobile-based Telemedicine Application using SVD and F-XoR Watermarking for Medical Images
...Show More Authors

A medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Al–bahith Al–a'alami
The Self and the Other in the Dogmatic Discourse: The Cognitive and Emotional Structure of the Authoritarian and Destructive Personality
...Show More Authors

The philosopher and social psychologist Erich Fromm (1900-1980), in his book "Escape from Freedom" highlighted the distinction between the "I" of the authoritarian personality and the "I" of the destructive personality based on their stance towards "the other." The former (the authoritarian self) relies on a submissive, enslaving formula, where the "I" is the master/dominator/controller/strong, while "the other" is the servant/submissive/controlled/weak, essential for perpetuating this formula. In contrast, the latter (the destructive self) relies on an annihilating, negating formula, where the "I" is existence/killer/destroyer/pe

... Show More
View Publication Preview PDF
Crossref