The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking operation and its implications for the human self. The research community formed of "females", and the sample included (204) respondents from the followers of "fashionista/ fashionist". The survey approach was used over the intentional sample method to obtain research data through the electronic questionnaire. The questionnaire contained closed questions and phrases according to Likert scale. The research reached several results, including: The sample of the research mostly ranges between 18-28 years of age, having a university education, and are not married and economically sufficient. Always interested in following "fashion" from "fashionista", and sometimes learning cooking techniques, and rarely follow "fashionist". They have a desire to perform plastic surgery, and they were respectively "filler and Botox, remove wrinkles", rhinoplasty, plastic surgery and whitening teeth, sculpting the waist and buttocks, getting the lip of the duck, and finally liposuction and stomach cutting. As for their motives of plastic surgery, mostly, are done in order to satisfy themselves, and in the second place to satisfy people, and in the third position to satisfy their husbands, and in the fourth position to obtain a husband. Finally, they do that to get a job.
|
The current study aims to determine the extent of SOMO's interest in strategic alignment operations and whether this interest is sufficient to be reflected in enhancing its organizational reputation. The field of research was in the oil marketing company SOMO. The managers in the top management within this company were targeted and the questionnaire was used as a data collection tool. The study population (109), (105) questionnaires were distributed, (94) questionnaires and (11) questionnaires were not retrieved, and the valid questionnaires had reached (91) and the analytical and descriptive approach was used for the study, the current research found to find A direct relationship and a positive effect of strategic
... Show MoreThe present research aims at revealing the advertising image semiotics in the American printed poster by following the image's significance and its transformations through the poster design trends and indicating its nature whether it is an explicit or implicit image. The limits of the research were the American printed poster during 2016-2018 period. The theoretical side was determined by two sections, the first: (the advertising image semiotics) and the second (design trends in the printed poster). The research procedures were represented by the research method adopted in the analysis of the sample models identified in four models taken from the research community which contains (24) models. The selection was made according to the trend
... Show MoreThe research seeks to design a program of guidance in the form of emotional perception rational to reduce the fear of failure, to identify the effect of method of emotional perception rational in reducing the fear of failure. To achieve these objectives, the researcher adopted the null-hypotheses, which assume there are no statistically significant differences in the degree of fear of failure (for the control group) in the pre-posttest. There are no statistically significant differences in the fear of failure (for the experimental group) in the pre-posttest. There were no statistically significant differences in the fear of failure of the groups (experimental and control) after the application of the program in the post-test. In order to
... Show MoreModern trends have appeared recently in educational thought that call for the achievement of the outcomes of the educational process. Some of these trends are the development of individual thinking skills, considering the individual differences, and learning basic skills. The five-year learning cycle is one of these models. It is called as five-year learning cycle because it passes through five stages. These five stages are: (operate - discover - clarify - expand – Evaluate), which make the learner as the main axis for activating thinking processes. This can be done by organizing study materials through research, investigation, and identifying concepts by himself, as in learning sports skills that depend on motor performance and teamwork,
... Show MoreThe art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show More<p>In this paper, a simple color image compression system has been proposed using image signal decomposition. Where, the RGB image color band is converted to the less correlated YUV color model and the pixel value (magnitude) in each band is decomposed into 2-values; most and least significant. According to the importance of the most significant value (MSV) that influenced by any simply modification happened, an adaptive lossless image compression system is proposed using bit plane (BP) slicing, delta pulse code modulation (Delta PCM), adaptive quadtree (QT) partitioning followed by an adaptive shift encoder. On the other hand, a lossy compression system is introduced to handle the least significant value (LSV), it is based on
... Show More