|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking operation and its implications for the human self. The research community formed of "females", and the sample included (204) respondents from the followers of "fashionista/ fashionist". The survey approach was used over the intentional sample method to obtain research data through the electronic questionnaire. The questionnaire contained closed questions and phrases according to Likert scale. The research reached several results, including: The sample of the research mostly ranges between 18-28 years of age, having a university education, and are not married and economically sufficient. Always interested in following "fashion" from "fashionista", and sometimes learning cooking techniques, and rarely follow "fashionist". They have a desire to perform plastic surgery, and they were respectively "filler and Botox, remove wrinkles", rhinoplasty, plastic surgery and whitening teeth, sculpting the waist and buttocks, getting the lip of the duck, and finally liposuction and stomach cutting. As for their motives of plastic surgery, mostly, are done in order to satisfy themselves, and in the second place to satisfy people, and in the third position to satisfy their husbands, and in the fourth position to obtain a husband. Finally, they do that to get a job.
|
The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe
... Show MoreThis article investigates how an appropriate chaotic map (Logistic, Tent, Henon, Sine...) should be selected taking into consideration its advantages and disadvantages in regard to a picture encipherment. Does the selection of an appropriate map depend on the image properties? The proposed system shows relevant properties of the image influence in the evaluation process of the selected chaotic map. The first chapter discusses the main principles of chaos theory, its applicability to image encryption including various sorts of chaotic maps and their math. Also this research explores the factors that determine security and efficiency of such a map. Hence the approach presents practical standpoint to the extent that certain chaos maps will bec
... Show MoreToday in the digital realm, where images constitute the massive resource of the social media base but unfortunately suffer from two issues of size and transmission, compression is the ideal solution. Pixel base techniques are one of the modern spatially optimized modeling techniques of deterministic and probabilistic bases that imply mean, index, and residual. This paper introduces adaptive pixel-based coding techniques for the probabilistic part of a lossy scheme by incorporating the MMSA of the C321 base along with the utilization of the deterministic part losslessly. The tested results achieved higher size reduction performance compared to the traditional pixel-based techniques and the standard JPEG by about 40% and 50%,
... Show MoreThis study has applied the theoretical framework of conceptual metaphor theory to the analysis of the source and target domains of metaphors that are used in two English nineteenth century sonnets, both written by contemporaneous female poets. The quantitative and qualitative results of the textual analysis have clearly revealed that Elizabeth Barrett Browning’s sonnet 23 centres around the conceptual mapping of the journey of love and life with that of possession. In contrast, Christina Rossetti’s sonnet Remember tackles the central conceptual mapping of death as a journey in relation to its further experiential connections. In addition, the application of conceptual metaphor theory in identifying the frequencies and densities of metap
... Show MoreBackground: Hyperthyroidism refers to overactive of thyroid gland leading to excessive synthesis of thyroid hormones and accelerated metabolism in the peripheral tissue. Objective: The aim of this study is to evaluate a new member of the IL-1 super family of cytokines interleukin-33(IL-33) levels in serum .in order to evaluate its utility as clinical bio marker of autoimmune disease (i.e. hyperthyroidism) Methods: The present study was conducted on 30 patients from the Iraqi female patients with hyperthyroidism attending Baghdad teaching hospital, in addition to 30 healthy controls. All subjects were (35-65) years old. Parameters measured in the sera of patients and healthy groups, were interleukin -33 (IL-33), Thyroxin (T4), Thyroxin (T3)
... Show MoreGymnastics play from sports games that need to use appropriate methods and strategies that address mental abilities and that let the learner create and think about better performance with the supervision and guidance of the teacher. The researcher has chosen meditative thinking, which is a kind of thinking that needs to be taken care of. It is thinking about the situation in front of the individual, analysing it to his elements and drawing up plans that need to be understood with a view to reaching the results required by the situation and evaluating the results in the light of the plans. The analysis of the situation looks to different elements and look for internal relationships between these elements in this case. The problem is that fem
... Show MoreNowadays nanoparticles have widespread application in various industriesbecause of their special and unique features, there are many studies in sideeffects of nanomaterial. This study done by 40 white female mice withevery other day intraperitoneally injection of low and high doses of both ofZnO kg of body weight) and FeOnanoparticles (5 and 40 mg/kg). After a 15 days period, the mice weresacrificed and blood samples were collected for hormone analysis, andtissue samples for morphometric studies.Statistical Analysis shows significant differences in LH, Estrogen,Progesterone hormone levels between groups, while there are insignificantdifferences in Follicle stimulating hormone (FSH) level between thegroups compared with its level in
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya