|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking operation and its implications for the human self. The research community formed of "females", and the sample included (204) respondents from the followers of "fashionista/ fashionist". The survey approach was used over the intentional sample method to obtain research data through the electronic questionnaire. The questionnaire contained closed questions and phrases according to Likert scale. The research reached several results, including: The sample of the research mostly ranges between 18-28 years of age, having a university education, and are not married and economically sufficient. Always interested in following "fashion" from "fashionista", and sometimes learning cooking techniques, and rarely follow "fashionist". They have a desire to perform plastic surgery, and they were respectively "filler and Botox, remove wrinkles", rhinoplasty, plastic surgery and whitening teeth, sculpting the waist and buttocks, getting the lip of the duck, and finally liposuction and stomach cutting. As for their motives of plastic surgery, mostly, are done in order to satisfy themselves, and in the second place to satisfy people, and in the third position to satisfy their husbands, and in the fourth position to obtain a husband. Finally, they do that to get a job.
|
The aim of this research is to measure the logical maturity of kindergarten children. To achieve this aim, the researcher adopted the scale of Gold Schmid and Bentler (1968), which was translated to the Arabic language by Shabili (1988). The scale was administered to a sample of (100) kindergarten children were chosen randomly from a number of kindergartens in Baghdad city for the academic year (2017-2018). SPSS was used to analyze the collected data. The results revealed there is a level of logical maturity among the kindergarten children. The researcher came out with a number of recommendations and suggestions. &
... Show MoreThe current study aims to find out:
- The ingratiating behavior of university students.
- The differences of statistical significance in The ingratiating behavior among university students according to the variables of sex and specialization
The current study is determined by University of Baghdad students of both genders (males and females) and for both majors (scientific and humanities) for the academic year (2019-2020).
In order to achieve the researcher's objectives:Ingratiating behavior scale has been constructed. It consists in its final form of (32) items divided into four behaviors. The researcher has extracted scale validity and reliability.
The researcher based the two scales
... Show MoreThe research aims to identify the level of Agentic thinking among a sample of male and female undergraduate students for both disciplines (scientific, and humanities). The researcher targeted the third and fourth stages for the academic year
(2021-2022). The study sample is (382) male and female students who were selected randomly from the University of Baghdad. To achieve the above-mentioned study aims. The researcher has developed a scale of Agentic thinking consisting of (25) items distributed over three domains. The results showed that the study sample has a high level of Agentic thinking. There are significant differences in agentive thinking in terms of gender in favor of females. There are no statistically significant diff
... Show MoreThis research aims to identify the vigilant personality of University teachers in term of gender. To this end, the researcher used the scale of Al-tememe (2017) for the vigilant personality, the scale was administered to the sample of the study which was (100) male and female teachers. The results have shown that university teachers generally have a vigilant personality, as well as the result showed a difference between male and female teachers on the level of vigilant personality in favor of males. In the light of these results the researcher has come with a number of recommendations and suggestions.
The current research aims to identify the possible self of university students and the differences in the level of possible self of students in terms of gender, specialization (scientific-humanitarian), and the interaction between them. In order to achieve the objectives of the current research, the two researchers have prepared a scale of the possible self, based on the theory (Markus and Nurius, 1986). The research tool was applied to a sample of (400) male and female students who were selected through a random stratified method from Al-Mustansiriya University students/morning studies for the academic year (2019-2020). The researcher reached the following results: the research sample has a high level of possible self; there is a differ
... Show MoreThe Educational Ideology of John Dewey
Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreThis paper is concerned with the design and implementation of an image compression method based on biorthogonal tap-9/7 discrete wavelet transform (DWT) and quadtree coding method. As a first step the color correlation is handled using YUV color representation instead of RGB. Then, the chromatic sub-bands are downsampled, and the data of each color band is transformed using wavelet transform. The produced wavelet sub-bands are quantized using hierarchal scalar quantization method. The detail quantized coefficient is coded using quadtree coding followed by Lempel-Ziv-Welch (LZW) encoding. While the approximation coefficients are coded using delta coding followed by LZW encoding. The test results indicated that the compression results are com
... Show MoreThis study was conducted to determine the effect of vitamin A ( 10 mg/kg ) on avearage testis weight and sexual glands ( Prostate and Seminal Vesicle ) for albino male mice treated with Hexavalent chromium ( 1000 ppm ) .The current study 40 mice were divided into fife groups : 1st group treated with distilled water and considered an control group (C) / the 2nd group treated with sesame oil ( T1) / 3rd group was givin hexavalent chromium ( 1000 ppm ) (T2) / 4th group treated with vitamin A ( 10 mg / kg ) and exposed to hexavalent chromium ( 1000 ppm ) (T3) / 5th group treated with vitamin A ( 10 mg kg ) (T4) . The expermint lasted 35 day . the results showed a significant ( P ? 0.05 ) decrease in avearage testis weight and sexual glan
... Show MoreThe most significant function in oil exploration is determining the reservoir facies, which are based mostly on the primary features of rocks. Porosity, water saturation, and shale volume as well as sonic log and Bulk density are the types of input data utilized in Interactive Petrophysics software to compute rock facies. These data are used to create 15 clusters and four groups of rock facies. Furthermore, the accurate matching between core and well-log data is established by the neural network technique. In the current study, to evaluate the applicability of the cluster analysis approach, the result of rock facies from 29 wells derived from cluster analysis were utilized to redistribute the petrophysical properties for six units of Mishri
... Show More