|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking operation and its implications for the human self. The research community formed of "females", and the sample included (204) respondents from the followers of "fashionista/ fashionist". The survey approach was used over the intentional sample method to obtain research data through the electronic questionnaire. The questionnaire contained closed questions and phrases according to Likert scale. The research reached several results, including: The sample of the research mostly ranges between 18-28 years of age, having a university education, and are not married and economically sufficient. Always interested in following "fashion" from "fashionista", and sometimes learning cooking techniques, and rarely follow "fashionist". They have a desire to perform plastic surgery, and they were respectively "filler and Botox, remove wrinkles", rhinoplasty, plastic surgery and whitening teeth, sculpting the waist and buttocks, getting the lip of the duck, and finally liposuction and stomach cutting. As for their motives of plastic surgery, mostly, are done in order to satisfy themselves, and in the second place to satisfy people, and in the third position to satisfy their husbands, and in the fourth position to obtain a husband. Finally, they do that to get a job.
|
A series of new 4-(((4-(5-(Aryl)-1,3,4-oxadiazol-2-yl)benzyl)oxy)methyl)-2,6-dimethoxy phenol (6a-i) were synthesized from cyclization of 4-(((4-hydroxy-3,5-dimethoxy benzyl)oxy)methyl)benzohydrazide with substituted carboxylic acid in the presences of phosphorusoxy chloride.The resulting compounds were characterized by IR, 1H-NMR, 13C-NMR, and HRMS data. 2,2-Diphenyl-1-picrylhydrazide (DPPH) and ferric reducing antioxidant power (FRAP) assays were used to screen their antioxidant properties. Compounds 6i and 6h exhibited significant antioxidant ability in both assay. Furthermore, type of substituent and their position of the aryl attached 1,3,4-oxadiazole ring at position five are play an important roles in enhancing or declining the antio
... Show MoreThe Iraqi marshes are considered the most extensive wetland ecosystem in the Middle East and are located in the middle and lower basin of the Tigris and Euphrates Rivers which create a wetlands network and comprise some shallow freshwater lakes that seasonally swamped floodplains. Al-Hawizeh marsh is a major marsh located east of Tigris River south of Iraq. This study aims to assess water quality through water quality index (WQI) and predict Total Dissolved Solids (TDS) concentrations in Al-Hawizeh marsh based on artificial neural network (ANN). Results showed that the WQI was more than 300 for years 2013 and 2014 (Water is unsuitable for drinking) and decreased within the range 200-300 in years 2015 and 2016 (Very poor water). The develope
... Show MoreBackground: Oncogenesis in the oral cavity is widely believed to result from cumulative genetic alterations that cause a transformation of the mucosa from normal to dysplastic to invasive carcinoma. The p16 gene produces p16 protein, which in turn inhibits phosphorylation of retinoblastoma (Rb), p16 play a significant role in early carcinogenesis. A number of epidermal growth factor receptor (EGFR) family, HER2/neu, has received much attention because of its therapeutic implications. The aims of the study were to evaluate and compare the immunohistochemical expression of the cell cycle protein P16 INK4a and c-erbB2 (HER2/neu) in NOM, OED, and OSCC. Correlate both marker expression with each other as well as with various clinicopathological
... Show MoreBackground: In Iraqi communities, the workers considered the largest population groups, so increasing their dental education by increasing the care for their dental health knowledge and behavior is very important, the present study was aimed to evaluate the gingival health and oral hygiene in relation to knowledge and behavior among a group of a workers selected randomly from Al Fedaa company in Baghdad city. Materials and methods: A sample of 110 workers (65 men and 45 women) included in this study, a questionnaire used to evaluate their oral health knowledge and behavior. The gingival health condition of the workers was examined by using Loe and Silness index (1963), Silness and Loe index (1964) was used to asses plaque quantity, and Ramf
... Show MoreWe aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure
Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreBreast cancer is one of the most widespread cancers,depending on World Health Organization, cancer calculated for approximately 7.6 million incidences in 2008, whoever expected elevation in incidence is about 13.1 million in 2030. So that the current research investigates vitamin D role in the occurrence of this disease and explains if vitamin D has a positive effect on the incidence of disease, as well as measuring parathyroid hormone and estrogen levels. Three groups were included in this analysis: control healthy women, benign and malignant breast tumor women. All cases that were selected at the beginning of the disease diagnosis. According to statistical values vitamin D showed highly significant (P<0.001) decrease in benign (3.74±2.33
... Show More