تحلل الورقة الحالية تمثيل كاريل تشرشل للصورة النمطية للمرأة في Top Girls (1982). تُظهر المسرحية كيف وصلت النساء في نضالهن لمحاربة اضطهاد الرجال عبر التاريخ ، إلى مستوى من القوة والحرية يستخدمان للسيطرة على جنسهن دون شفقة. مارلين ، الشخصية المركزية في هذه المسرحية ، هي امرأة تبنت الصفات الذكورية إلى أقصى الحدود. لتسلق سلم النجاح إلى قمته ، تضحي مارلين بطفلها وعائلتها وحبها. كما تعرض المسرحية النساء الصامتات والمضطهدات والمعتمدات وضحى بفرصة الاستقلال والحرية. علاوة على ذلك ، تبحث الورقة في وجهات نظر الطبقات المختلفة ، وخاصة وضع الطبقة العاملة ، تجاه سياسات أول رئيسة وزراء في المملكة المتحدة ، السيدة الحديدية ، مارغريت تاتشر.
In this research , we tried to identify the meaning empowerment in the development literatures , and inquire the most enabling prominent actions to promote women , as we considered the most important international conferences that take up the subject of women's empowerment .
In the context of research on the subject of empowering women to occupy leadership positions , we tried to diagnose the target of the empowerment , and we clarify the correlation between human development and empowerment of women , also the research touched on the decision (1325) issued by the United Nations , which includes provisions regarding the importance of women participation at all levels in the process of decision-making .
We realized that there are so
Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si
... Show MoreThe digital camera which contain light unit inside it is useful with low illumination but not for high. For different intensity; the quality of the image will not stay good but it will have dark or low intensity so we can not change the contrast and the intensity in order to increase the losses information in the bright and the dark regions. . In this search we study the regular illumination on the images using the tungsten light by changing the intensities. The result appears that the tungsten light gives nearly far intensity for the three color bands(RGB) and the illuminated band(L).the result depend on the statistical properties which represented by the voltage ,power and intensities and the effect of this parameter on the digital
... Show MoreThis study aims to identify the anxiety pregnant women have of dying, in the light of some Demographic variables in Bethlehem (age, residence, and the mother's job). The descriptive method was used in this study. To achieve the study purposes, the researchers developed a questionnaire as a tool of study, which consisted of (19) paragraphs ,after been verified of its validity & stability.
The researchers distributed questionnaires, and then analyzed them. Results illustrated that the levels of anxiety pregnant women in Bethlehem had of dying was average, with a mean total score of (3.11), and with a standard deviation that had the total score of (0.476). Results also illustrated statistical differences in the pregn
... Show MoreAbortion is categorized as the termination of conception caused by the failure or removal of the embryo from the uterus before the conclusion of pregnancy. Microorganisms and genetic factors are two of the many factors associated with abortion. Cytomegalovirus is a widespread congenital virus infection pathogen that affects a wide variety of people. The prothrombin gene is one of the essential causes that trigger blood clotting and the function of abortion women, therefore the aim of the study is to detect and associate Cytomegalovirus and prothrombin gene mutation (Gene ID: 14061 in NCBI) with abortion through genetic and immunological methods. Five ml of whole blood was collected from an intravenous puncture and divided into two tubes,
... Show MorePre-eclampsia is the most common medical complication of pregnancy associated with increased maternal and infant mortality and morbidity. Its exact etiology is not known, although several evidences indicate that various elements might play an important role in pre-eclampsia. This study was carried out to analyze and to compare the concentration of calcium, in mild pre-eclampsia and in normal pregnant women , and to determine the effect of oral supplementation with calcium on mild pre-eclampsia , and whether this effect is related to the change in the level of serum calcium. Forty- five women in the third trimester of pregnancy were selected to participate in this study and divided into: fifteen apparently healthy, normo
... Show MoreGestational diabetes mellitus (GDM) is a growing health concern that usually appears during the second and third trimester stage of pregnancy and is characterized by carbohydrate intolerance of variable severity. The aim of the present study was to scrutinize the relationship between the G972R polymorphism of the insulin receptor substrate-1 (IRS-1) gene with GDM in the Iraqi female population. One hundred and twenty of blood samples taken from healthy women (control) and women with gestational diabetes mellitus in 3rd trimester stage of pregnancy, fasting blood glucose (FBG) and HbA1c% measured to diagnose GDM, lipid profile (cholesterol, triglyceride, HDL, LDL, and VLDL), insulin concentration, insulin resistance and beta cell function to
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show MoreThe purpose of this study was to investigate the effect of a Cognitive- Behavioral Training Program in reducing Problems Solving among a sample of education university College Students, the study sample consisted of (50) students were randomly assigned to two groups: experimental, and control; (25) students per group, the results of (ANOVA) revealed that there were significant differences at (p < 0.05) between experimental and control group in Problems Solving level, while there were significant differences between both groups in achievement. The researchers recommended further studies on the other variables which after training students on the method of solving problems and techniques to reduce stress.<
... Show More