This research aims to harmonize contemporary and traditional clothes, also expenses and savings. It is done by recycling evening clothes into Clothes with traditional features. The study followed descriptive explanatory approach. The sample consisted of seven dresses, as well as 208 female participants from Makkah Al-Mukarramah province, the age range was between 21 and 65 years old. An electronic questionnaire was distributed and the stability and reliability of the internal consistency were measured.
The research resulted in the ability to recycle evening dresses into modern clothes with traditional characteristics. It also confirmed that the reason of wearing traditional clothes is spirituality of the month of Ramadan. Addi
Writing as a female playwright in theatre gives a deeper depiction of woman’s real- self. Beth Henley has succeeded in providing a new realist vision of women’s abilities to face their inevitable tragic fates and how to conquer their despair. In Crimes of the Heart, the playwright uses certain method to present the development of the heroines’ characters through blending the tragic events with a comic frame. In fact, Henley focuses on the simple humorous activities more that the importance of the tragic event to present her vision of how to survive and face the crisis of life.
Crimes of the Heart is a play that is concerned about three sisters whose lives are headed in distinctly different directions; howe
... Show MoreRare earth metal oxides (REMOs) have gained considerable attention in recent years owing to their distinctive properties and potential applications in electronic devices and catalysts. Particularly, cerium dioxide (CeO2), also known as ceria, has emerged as an interesting material in a wide variety of industrial, technological, and medical applications. Ceria can be synthesized with various morphologies, including rods, cubes, wires, tubes, and spheres. This comprehensive review offers valuable perceptions into the crystal structure, fundamental properties, and reaction mechanisms that govern the well-established surface-assisted reactions over ceria. The activity, selectivity, and stability of ceria, either as a stand-alone catalyst or as
... Show MoreBackground: One of the most prevalent procedures in oral surgery is the removal of impacted mandibular third molars, typically accompanied by trismus, edema, and pain. Several methods and biomaterials were implemented to mitigate or avoid these surgical problems. Objectives: To evaluate the efficiency of chlorhexidine gel (WISDOM®) in minimizing postoperative sequelae associated with the impacted mandibular third molar that will be surgically extracted and its role in promoting early soft tissue closure of the surgical site. Methods: The study design was a double-masked and randomized, controlled clinical study that included healthy patients needing the removal of a mandibular third molar through surgery. The participants were rand
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreAntibacterial Activity of Bioactive Glass 45S5 and Chitosan Incorporated as Fillers into Gutta Percha, Ahmed I AL-Jobory*, Raghad AL-Hashimi