Objective(s): To determine the prevalence and predisposing factors of psychology & personality types among
infertile and fertile women attending in Complex Imam Khomeini Hospital.
Methodology: A total of 150 infertile women from Vali-Asr Reproduction Health Research Center and 150 fertile
women from the Gynecology Clinic of Imam Khomeini Hospital in Tehran / Iran were chosen by simple
randomization. Data was obtained by using Eysenck personality (EPQ) and structured researcher questionnaires.
Results: showed that based on Eysenck personality questionnaire (EPQ), personality instability was more common
among infertile women than fertile women; this relationship was statistically significant (P<0.001). Housewives
were at higher risk of developing psychological disorders and personality instability as compared to occupied
women. These findings were also statistically significant (P<0.001).
Recommendations: Considering the high prevalence of psychological disorders and personality problems among
infertile women, it seems that more serious attention is required from gynecologists, psychiatrists and
psychologists for treatment of these disorders. The use of psychotherapy, especially supportive methods, should
be considered as part of the general therapeutic framework of infertility.
The aim of this book is to present a method for solving high order ordinary differential equations with two point boundary condition of the different kind, we propose semi-analytic technique using two-point osculatory interpolation to construct polynomial solution. The original problem is concerned using two-points osculatory interpolation with the fit equal numbers of derivatives at the end points of an interval [0 , 1] . Also, we discussion the existence and uniqueness of solutions and many examples are presented to demonstrate the applicability, accuracy and efficiency of the methods by compared with conventional method .i.e. VIDM , Septic B-Spline , , NIM , HPM, Haar wavelets on one hand and to confirm the order convergence on the other
... Show MoreThe type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No
... Show MorePurpose: As managers can lead a set of ways to improve internal communication in public organizations, and leadership can cultivate a common understanding of goals within the organization and share the vision in preparation for its way to better performance, the purpose of the research is to assess the type and strength of the relationship between internal communication and different forms of leadership. Theoretical framework: The study demonstrates how leaders in public organizations improve internal communication, related to employees' perceptions of public organizations' routines and performance. Design/methodology/approach: The study uses the ordinary least squares (OLS) and applied multiple regression A sa
... Show MoreThe basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
Abstract-Industrial and urban development has resulted in the spread of plastic waste and the increase in the emissions of carbon dioxide resulting from the cement manufacturing process. The current research aims to produce green (environmentally friendly) concrete by using plastic waste as coarse aggregates in different proportions (10% and 20%) and nano silica sand powder as an alternative to cement in different proportions (5% and 10% by weight). The results showed that compressive strength decreased by 12.10% and 19.23% for 10% and 20% plastic waste replacement and increased by 12.89% and 20.39% for 5% and 10% silica sand replacement respectively at 28 days. Flexural strength decreased by 12.95% and 19.64% for 10% and 20% plastic waste
... Show MoreSoil is a crucial component of environment. Total soil analysis may give information about possible enrichment of the soil with heavy metals. Heavy metals, potentially contaminate soils, may have been dumped on the ground. chromium, nickel and cadmium,
To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MorePDBN Rashid, International Journal of Professional Studies, 2023