Address the current research study " Symbol Significances in Fakhir Mohammad Paintings " in an attempt to detect signs of the icon in the artist's fee . The research contains four chapters The first chapter of which the methodological framework for the search starting with the problem of the specific research and asking the following: Maaltold semantic code in fees Luxury Muhammad? As well as displaying the importance of research and the need for it and in order to search through ( you know the implications of the code in the fee Luxury Muhammad) and for the period of ( 1980-2010 ) in his works of art as well as identifying the search terms . In the second chapter , such as the theoretical framework , and contained three sections focus o
... Show MoreThe study aims to identify the concept of empowering women from the point of view of experts in the Palestinian society, specifically in Gaza, as well as to explore the foundations of their formation of this concept. Additionally, the study seeks to clarify the most important challenges facing the empowerment of women in Palestinian society. The study used the design of a grounded theory that seeks to build the theory through deep analysis of the data, as qualitative data were collected through holding two focus groups and six in-depth interviews with the study sample, who were selected by the method of targeted sampling. The sample included (16) individuals (9 female experts, 7 male experts) holding academic and community leadership pos
... Show MoreStrangeness in design generally and in advertisement design specifically is manifested in various images and creative propositions and shapes that depart the traditional and conventional framework to elevate design to virtual intellectual worlds related to the inspirational and imaginative range of the creative designer, which makes the forms of strangeness a means for persuasion and astonishment which achieves the functional and aesthetic objectives of the advertisement. The two researchers identified the research question "what is the concept of strangeness in the commercial advertisements design? The research objective has been determined by identifying the concept of strangeness in the commercial advertisement design. Strangen
... Show MoreThe alterations in glyoxylate reductase and hydroxy-pyruvate reductase concentrations in the sera and the genetic alterations associated with calcium oxalate kidney stones in Iraqi patients were not studied previously so this study aimed to focus on these points. This study included 80 subjects; they were 50 patients with calcium oxalate stones compared to 30 apparently healthy controls. Biochemical investigations for kidney functions (creatinine, urea, and uric acid), were performed on the sera of both groups. Also, complete blood count, random blood sugar, and blood group tests. Furthermore, urine had been collected for General Urine Examination to visualize oxalate crystals in the urine of the patient. Also, the GRHPR
... Show MoreObjective: This research aimed to study the relation between maximal bite force (MBF) and maximum mouth opening among 12-year-old school children. Methods: In this cross-sectional study, a total of 400 children aged 12 years (194 boys and 206 girls) were examined. The MBF for the right and left side, as well as the anterior region, were evaluated for all children. The MMO was measured using an electronic digital caliper. To analyze the data path analysis method was used. Results: Boys showed a higher MMO of 48.797 ± 6.500 than girls (46.710 ± 5.926 mm). The MMO increased with increasing MBF, with significant differences between females and males. Conclusion: The MMO was higher in boys than in girls. Gender plays a significant ro
... Show MoreAt the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena
... Show More