The study deals with China's soft power and diplomacy in the Middle East, and it focuses specifically on the tools and foundations of China's soft diplomacy and how it achieves its goals in the region in addition to its challenges in the region. In this regard, the study also focuses on the Chinese Belt and Road Initiative and its soft foundations and how they serve China’s diplomacy and soft power in the region. The study ends with a set of conclusions, perhaps the most prominent of which is that diplomacy and soft power have become a fundamental pillar of China's foreign policy to achieve its foreign goals and to establish an international system compatible with China's principles. As for the Middle East, China has established a policy in the region in order to achieve its goals, especially securing its share of oil, based on non-interference and neutrality. This policy has represented a basic pillar of diplomacy and soft power for China and the enhancement of its positive image in the region. The Belt and Road Initiative promoted by China in the region gives a strong impetus to China's soft power and enhances its positive image. Especially since the initiative itself is based on soft and civilized principles, and the slogan of "Win-Win Cooperation". is the main slogan of the initiative. However, China's diplomacy and soft power in the region still faces many great challenges, the most important of which is the difficulty of competing with Western soft power, especially the American one, or the lack of attractiveness of China's soft power in front of its Western counterpart.
Background: The global threat of COVID-19 outbreak and on the 11 March 2020, WHO acknowledged that the virus would likely spread to all countries across the globe and declared the coronavirus outbreak a pandemic which is the fifth pandemic since 20 century and this has brought human lives to a sudden and complete lockdown and the confirmed cases of this disease and deaths continue to rise in spite of people around the world are taking important actions to mitigate and decrease transmission and save lives. Objectives: To assess the effect of exercise and physical activity on the immunity against COVID-19. Methods: Collected electronic databases including (Medline, EMBASE, Google Scholar, PubMed and Web of Science) were searched with
... Show MoreDespite the development in the fields of communication and informatics, the book remains its distinguished presence and popular popularity as it is the oldest means to obtain knowledge, addressing the vast majority of society in different levels and levels of knowledge and culture. The design of the cover book portal and the structure of semolina semantic including the elements of construction and typography contribute to the activation of the relationship between form and content, and here lies the importance of this relativity and its role in enhancing the communicative dimension of the design of the book cover, and cast a shadow on the promotional and marketing effectiveness. Hence the importance of research, but the prob
... Show MoreThis paper aims to give an overview of acculturation in the literature by means of its explicit definitions, main characteristics, and categorical process. It also foreshadows the significance of acquiring novice culture with particular connection to second language acquisition. Schumann and John Berry underscored acculturation each with its own model of acculturation. In the case of this review, you will realize that Schumann's two main aspects are firmly rooted in berry's model of acculturation as an exclusive description in relation to second language acquisition. Steven Krashen outlined acquiring language from the intellectual and linguistic view of learning, whereas Micheal Long demanded for communication in social perspective. It has
... Show MoreAbstract In this work we introduce the concept of approximately regular ring as generalizations of regular ring, and the sense of a Z- approximately regular module as generalizations of Z- regular module. We give many result about this concept.
In developing countries, individual students and researchers are not able to afford the high price of the subscription to the international publishers, like JSTOR, ELSEVIER,…; therefore the governments and/or universities of those countries aim to purchase one global subscription to the international publishers to provide their educational resources at a cheaper price, or even freely, to all students and researchers of those institutions. For realizing this concept, we must build a system that sits between the publishers and the users (students or researchers) and act as a gatekeeper and a director of information: this system must register its users and must have an adequate security to e
... Show MoreThis paper presents the concepts of prepaths, paths, and cycles in α-topological spaces and studies them in orderable spaces. Also, many relationships are proved with their equivalences using some properties in topological spaces like compactness and locally connectedness.
Tolerance and its impact on building society
Degradation of soil quality is an inevitable consequence of modifications to the characteristics of the soil that contribute to a decrease in ecosystem services. Numerous stressors, including chemical, biological, and physical ones, as well as those originating from both natural and artificial sources. The most prevalent kind of soil contamination that contaminates soil biota is agrochemicals. Soil is the most common place for xenobiotic dumping, which makes it the most probable source of other natural resources' pollution, such as surface and ground waters, based on the results of several studies. The danger to the environment posed by polluted soils is influenced by a variety of biological and physicochemical mechanisms that regul
... Show MoreIn this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show MoreAbstract
The Research "Surah At-Talaq between Commentators and Jurists" is summarized in the objectives of the Surah, clarifying the meanings of the verses of the rulings contained therein by mentioning the statements of the commentators, with mentioning the most acceptable of those meanings when a difference arises, explanation of the provisions of the Surah, with a statement of sayings of the four religious schools of Islamic jurisprudence, in summary, due to the narrowness of the place, and the most acceptable of them.
The research addresses (9) topics, which are: the objectives of Surah At-Talaq, prohibition of divorce during menstruation, testifying retract and divorce, irrevocably divo
... Show More