Arab Food's Security
This study aimed at identifying the effect of violence on speech disorders concerning Arab Broadcasting . Language is a pot of thought and a mirror of human civilization and communication tool, but the Arabic language is suffering a lot of extraneous terms them, particularly through the media. This study attempts to answer the following question: Is the phenomenon of linguistic duality in the Media reflected negatively on the rules of the classical language? The study deals with the explanation and interpretation of the phenomenon that has become slang exist in our Media More. And the study suggests re- consideration of the value in the Media ,hence the problem will be resolved.
The Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti
... Show MorePrecious stones enjoyed a high level of goodwill among people in the ancient world as they were considered as important source of their jewels, an effective medicine to cure their diseases and spiritual healing that bring optimism and happiness by holding it especially to those who believe their effects on the Human.
Arab woman didn't abandon the interests of the neighbor civilizations as she coped with them and took what she desired of jewelry like pearls, sapphires and emerald. She used some of precious stones like antimony, magnet and bezoar in prescriptions for curing diseases and injuries. She also used turquoise, onyx and cat eye stone to prevent envy and Exorcism purposes as she thought that these stones could protect her from
United Arab of Emirates made efforts in developing workforce in the field of nuclear energy that it had a chance to attract specialized of this field that it reflect growth in every field of life through which it take special procedures to face casas as fokoshima .the state had started to apply the UAE peaceful nuclear program by opening (Baraka)station in 2010 as to be the first in the Arab world to aim to enhance and diversification energy sources of electricity there in addition to enhance the state’s efforts to achieve economic refreshing and environmental protect.
The modern nation state, by virtue of its institutional nature, is divided into political and non-political institutions according to their respective jurisdictions. It is natural for non-political institutions to perform their functions under the control of the political establishment, for two reasons: first, Second: Ensuring the achievement of cooperation, harmony and integration between these different institutions in serving the stability of the society and its continuity and achieving its supreme objectives. The location of the military establishment is part of the non-political institutions of the state, since it carries out a non-political function that is based on defending the homeland against any threats that may threaten its s
... Show MoreThe main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreThe study aimes to analyze the discourse of Arab tweeters regarding the normalization of Arab-Israeli relations on the social media site (Twitter).
Study Methodology: The study relay on the survey method, using the comprehensive survey method, and this research is one of the descriptive types that aim to describe the phenomenon in a qualitative way, and discuss it through the method of in-depth analysis, in addition to using the tools of (discourse analysis).
Study sample: A sample of (8686) tweets for (7425) tweeters, which was posted on Twitter during the period from 15/9 to 30/9/2020, on the issue of normalizing Arab-Israeli relations.
Study tools: The data study was collected using the data mining tool from social networks (
Technological development intersects with terrorism to a large extent, beyond the use of the Internet and social media, in order to spread ideas, obtain support and financing, and recruit new elements, to the area of tactics and techniques of terrorist attacks, and everything related to the arsenal of terrorist weapons in the present and future, while technology offers many benefits. In various fields, and contribute to achieving multiple gains for humanity, they provide extremist and terrorist organizations and elements with a set of weapons and means through which they attempt to bypass monitoring and control efforts and the restrictions imposed on the use of weapons. They also help in planning and implementing their terrorist operations,
... Show MoreBriefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.