Preferred Language
Articles
/
jeasiq-1830
Jordanian economy and ways to advance it
...Show More Authors

عند إطلالتنا على هذا البلد العربي لابد من التقصي ولو بعجاله عن اقتصاده وهو الاهم باعتبار ان الاقتصاد هو شريان الحياة لأي أمة فلا غنى ولا تهاون في نفس الوقت عن هذا الجانب المهم الذي يرتبط مدى تطوره بتطور البلد وهذا الاخير مرتبط بما متوفر لديه من موارد بشريه ومادية وان تفاوتت النسبة بينها فلا ضير في ذلك فالاهم هو وجود الموجه والمخطط بالاتجاه الصحيح نحو الاستغلال الامثل لهذه الموارد
(وان قلّتْ) وبالتالي الافادة منها بما يعود بالفائدة على الاقتصاد الوطني الاردني ..

    ففي جانب الموارد الطبيعية امتلكت الاردن الثروات الطبيعية كالفوسفات بالدرجة الاولى والبوتاس والاملاح والغاز الطبيعي والحجر الكلسي والصخر الزيتي ولا ننسى قطاع السياحة والخدمات واتفاقيات التجارة وبعض الصناعات الاستخراجية جنوب المملكة ..

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 12 2017
Journal Name
Revista Publicando
WAYS OF CREATING ARABIC SCIENTIFIC TERMINOLOGY
...Show More Authors

Resumen The article deals with the analysis of different ways of creating Arabic scientific terminology. Arabic scientific style includes the terminology that represents different scientific areas functioning in all Arabic countries. These ways can be classified as: giving the meaning of terms; construction of new terms according to the rules of word formation; reduction and ellipsis of terms; direct term borrowing, all the above-mentioned being subject to further analysis. Main objectives of academic style, the specific features and certain lexical and grammatical peculiarities of the Arabic scientific terminology are under consideration as well. Discussed in the paper are linguistic and extra-linguistic factors influencing the ways of sci

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 02 2025
Journal Name
Journal Of Physical Education
Some Biomechanical Limitation During Acceleration Phase and Its Relationship With (110) m Hurdles Achievement for Advance Runners
...Show More Authors

View Publication
Publication Date
Wed Jan 10 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT: ENCAPSULATION OF OMEGA-3 FATTY ACID USING NANOTECHNOLOGY TO IMPROVE ITS THERMAL STABILITY AND USE IT TO ENRICHING THE YOGURT
...Show More Authors

Concentrations 25, 50 and 100 mg of nano-capsules linolenic acid and non-capsulated fatty acid for 1kg of Milk was used for yogurt manufacture. The results showed no significant differences in the ratio of titration acidity and pH values between all processed treatments at the beginning and during of period storage. The treatments was added to it coated omega-3 by nano method were the least exposed to the oxidation process from the non-capsules omega-3, And for shield of The poly lactic acid had a significant role in the protection of alpha-linolenic acid against lipolysis by the formation of a protective layer to protect the acid from the activity of lipases enzymes, and the addition of fatty acid linolenic to milk was determined the gr

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 16 2022
Journal Name
Journal Of Positive School Psychology
Electronic Publishing And Its Impact On Building And Developing Groups In Jordanian University Libraries
...Show More Authors

Preview PDF
Publication Date
Sun Oct 21 2018
Journal Name
Al–bahith Al–a'alami
Ways to face rumors in the social networking site Facebook: Research thesis from the PhD thesis
...Show More Authors

The research deals with the subject of «ways to face rumors in the site of social networking Facebook», a research based on a doctoral thesis, as the research dealt with rumors in the most dangerous type of new media, which sites of social communication with the global community as spreading rumors of all kinds and afflicts everyone who has eyes on him Of the audience of these sites, and aims to identify the rumors on Facebook because it is one of the most popular sites in the world and the strategy of combating the rumors published by Facebook users in their personal pages and groups that organize them, as well as identify methods and methods that can be During which the face of the rumors in the said site and eliminate them t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
Parametric design tools and how to take advantage of it in 3D sculptural design
...Show More Authors

The design was distinguished in Late Twenty-First Century With new and new methods Through which the ability to adapt all technical media in the formation of two-dimensional and three-dimensional figures and shapes was achieved .
Which led to the emergence of endless sets of design ideas characterized by the heterogeneity of design forms and design solutions that preceded it. The designer could not access these creations in various architectural and artistic fields only through computer programs, especially those related to the activation of mathematical logic and what is known as algorithms in the formation and construction of the form, which led to the emergence of the "parametric direction" and the problem of research is summarized

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Towards Scaling up Palestinian women’s participation in Private Businesses
...Show More Authors

This study sheds light on female entrepreneurship in Palestine, and explores the reasons behind its relative weakness as compared with men, and with female entrepreneurship in other countries. This study aims at proposing effective policies and doable measures to enhance female entrepreneurship. Achieving this objective will carry significant impact on employment and economic growth at large, and increase women’s economic participation, scaling up their independence, and demonstrating their skills and abilities, and putting women on an equal footing with men. Furthermore, entrepreneurial activity has increasingly become one of the key drivers of economic development. An increased rate of entrepreneurial activities among women,

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 02 2025
Journal Name
Journal Of Physical Education
Consecutive Case Study of Detraining On Some Functional, Physical, Body and Compound Skills Variables In Advance Basketball Players
...Show More Authors

View Publication
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF