This study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present the Palestinian perspective to a global audience, while the central objective is to debunk the false Israeli narrative, which relies heavily on targeted propaganda.
In this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF4] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF6]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreThis experiment presented essential oils by GC/MS, pigment content, and their antioxidant activities as well as sensory evaluation of delight samples. Limonene (66.88%) was the most prevalent yield. The peels of clementine had DPPH and ABT Scavenging activity. All levels of pigment extract had better scores for all sensory values and recorded acceptable scores in terms of appearance, color, aroma, and overall acceptability compared to control delight. Besides, delight samples containing 15 mg astaxanthin pigment extract showed maximum sensory scores compared to other samples and control delight. On the other hand, the product was less acceptable to the panelists compared to control in the case of the addition of 3.75 mg astaxanthin pigme
... Show More