Preferred Language
Articles
/
jperc-438
Attitudes towards Mental illness among Pregnant Women AttendinGovernment on Women's Clinics in the Province of Ramallah and Al-Bireh
...Show More Authors

This study aimed to identify attitudes towards mental illness in pregnant female clients to clinics women in the province of Ramallah and Al Bireh, for this purpose applied to study procedures on a sample of (200) of pregnant mothers were selected a sample available, have reached results no statistically significant differences in the level of attitudes towards mental illness due to the variable age in mothers pregnant female clients to clinics for women. Ther were astatistically significant differences in the level of these trends depending on the variable-level scientific research for the benefit of pregnant class university students and older and then high school and so on all areas except the area of social interaction, The results also showed a statistically significant differences in the level of these attitudes towards mental illness due to a variable number of times the load on the field of treatment for the first time to download, and no statistically significant differences on the rest of the fields, and reached results are also statistically significant differences in the level of attitudes towards mental illness in Pregnant variable depending on the number of abortions and that the areas of social compliance and the total score for the lack of abortion, and there is no statistically significant differences depending on this variable on the rest of the fields.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jul 16 2024
Journal Name
مجلة دراسات المرأة
" الأمن البيئي ودور المرأة في الحفاظ على الموارد الطبيعية
...Show More Authors

يعد الأمن البيئي موضوعاً حيوياً لا سيما في العصر الحديث، حيث بدأت تحديات التغير المناخي تتدهور وبسرعة متزايدة. وتزداد أهمية هذا الموضوع مع تصاعد تلك التحديات، أذ يتعين على الجميع لا سيما النساء منهم المشاركة في الحفاظ على البيئة لضمان استدامتها للأجيال الحالية والمستقبلية. ويُعد الحفاظ على البيئة والموارد الطبيعية أمراً ضرورياً لضمان استدامة الكوكب ومستقبل الأجيال القادمة. وفي هذا السياق، يأتي دور المرأة

... Show More
Preview PDF
Publication Date
Mon Nov 19 2018
Journal Name
Arab Science Heritage Journal
الطب الطب العربي وأثره على المعرفة الطبية في أوربا
...Show More Authors

This Kind of study has a special importance. Great numbers of Arab Muslims share a lot of their work, their Trans lations & new additions to scientific heritage. They facilitate the indirect way for Europeans to got Greek scientific knowledge. Ibn Sina classified & collected in his book (Law) Galen`s medical publications & he clarified, arranged & make them easy to understand.

View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
مجلة نسق
الطرائق التربوية والنفسية في الوقاية من الإدمان على المخدرات
...Show More Authors

View Publication
Publication Date
Tue Jan 30 2018
Journal Name
مجلة جامعة الانبار للعلوم القانونية والسياسية
الحماية المدنية للمستهلك في المرحلة السابقة على التعاقد الالكتروني
...Show More Authors

يتناول البحث الحماية المدنية للمستهلك في المرحلة السابقة على التعاقد الالكتروني

Publication Date
Wed May 05 2021
Journal Name
Arab Science Heritage Journal
تربية الشباب في التراث الاسلامي وانعكاساتها على الواقع المعاصر
...Show More Authors

Islam paid great attention to the youth, and took care of them because they
are the strength and movement, which is the preferrence stage in human life,
and they are the ones who

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Strongly F – Regular Modules and Strongly Pure Intersection Property
...Show More Authors

A submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Research Journal Of Pharmacy And Technology
Bacteriological and molecular study on S. Aureus bacteria Atala, M.L.
...Show More Authors