Preferred Language
Articles
/
jkmc-744
COVID-19 and the Conspiracy Theories
...Show More Authors

The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of The College Of Languages (jcl)
Rebellious Self - A Reading in Madame Bovary's Character of Flubert and Hanna Konin by Amos Oz - Comparative study: האני המורדת - קריאה בדמותה של מאדאם בובארי של פלובר וחנה גונן של עמוס עוז – מחקר השוואתי
...Show More Authors

The problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati

... Show More
View Publication
Publication Date
Sun Jan 12 2025
Journal Name
Journal Of The Iraqia University
Conflict of Identities Among Immigrants: A Study of Jamaica Kincaid’s Lucy and Hassan Blasim’s Nightmares of Carlos Fuentes صراع الهويات بين المهاجرين: دراسة في قصة لوسي لجامايكا كينكايد وقصة حسن بلاسم كوابيس كارلوس فوينتس
...Show More Authors

The struggle between two identities is a crucial subject everywhere. Some people travel abroad in quest of a new identity after struggling at home. People migrate and embrace a new identity for different reasons. They find themselves in a state of internal conflict as they navigate the tension between their newly adopted identities and their old ones. The individual is haunted and overwhelmed by their previous experiences. This research explores the universality of the subject matter by examining the motivations underlying the adoption of a new identity in a distinct geographical and temporal context. This paper examines the literary works of Kincaid's Lucy (1990) and Blasim's "The Nightmares of Carlos Fuentes" (2014). Kincaid’s pro

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 23 2018
Journal Name
Suleyman Demİrel University
ANALYZING POSTGRADUATE STUDENTS' USE OF PRAGMATIC FEATURES AND ARGUMENTATION IN THESIS WRITING: A CORPUS-BASED STUDY تحليل استخدام طلبة الدراسات العليا للسمات التداولية و الحجج في كتابة الرسائل العلمية : دراسة تعتمد تحليل البيانات المحوسبة
...Show More Authors

This study addresses the issue of academic writing in English by comparing pragmatic argumentation in the writing of 40 graduate students studying at Iraqi universities (SSIU) with the writing of 40 graduate students studying at American universities (SSAU). In these 80 theses, six selected aspects of academic writing were analyzed: (a) paragraph structure, (b) length and construction of sentences, (c) organization of information in sentences, (d) vocabulary, (e) topic sentences, and (f) discourse markers. This study seeks to go beyond the traditional and often onedimensional analysis of pragmatics of argumentation in English academic writing to distinguish and describe different aspects of academic writing and their results when used by EF

... Show More
Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Theoretical Study, and Biological Evaluation of Some Metal Ions with Ligand "Methyl -6-[2-(4-Hydroxyphenyl) -2-((1-Phenylethylidene) Amino) Acetamido] -2,2-Dimethyl-5—Oxo-1-Thia-4-Azabicyclo [3.2.0] Heptane-3-Carboxyylate
...Show More Authors

Schiff base (methyl 6-(2- (4-hydroxyphenyl) -2- (1-phenyl ethyl ideneamino) acetamido) -3, 3-dimethyl-7-oxo-4-thia-1-azabicyclo[3.2.0] heptane-2-carboxylate)Co(II), Ni(II), Cu (II), Zn (II), and Hg(II)] ions were employed to make certain complexes. Metal analysis M percent, elemental chemical analysis (C.H.N.S), and other standard physico-chemical methods were used. Magnetic susceptibility, conductometric measurements, FT-IR and UV-visible Spectra were used to identified. Theoretical treatment of the generated complexes in the gas phase was performed using the (hyperchem-8.07) program for molecular mechanics and semi-empirical computations. The (PM3) approach was used to determine the heat of formation (ΔH˚f), binding energy (ΔEb

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Eurasian Chemical Communications
Assessment of hypoxemia status by measuring serum level of hypoxia inducible factor 1 alpha in relation to tumor suppression protein p53, estradiol and tumor proliferation markers of breast cancer in Thi-Qar province/Iraq
...Show More Authors

Scopus (10)
Scopus Clarivate
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Calculation of Photon Emission from Quark-Antiquark Annihilation Using QCD Theory
...Show More Authors

In this work, we calculate and analyze the photon emission from quark and anti-quark interaction during annihilation process using simple model depending on phenomenology of quantum chromodynamic theory (QCD). The parameters, which include the running strength coupling, temperature of the system and the critical temperature, carry information regarding photon emission and have a significant impact on the photons yield. The emission of photon from strange interaction with anti-strange is large sensitive to decreases or increases there running strength coupling. The photons emission increases with decreases running strength coupling and vice versa. We introduce the influence of critical temperature on the  photon emission  rate in o

... Show More
Crossref (5)
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Non-Linear Behavior of Strengthened Steel-Concrete Composite Beams with Partial Interaction of Shear Connectors
...Show More Authors

In this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 15 2022
Journal Name
Journal Of The College Of Basic Education
مواضع الأصابع في العزف على آلة العود في النظرية الموسيقية العربية
...Show More Authors

    جاء البحث متكوناً من أربعة فصول مع قائمة بالمصادر كالآتي :         حيث يتناول الفصل الأول الإطار المنهجي للبحث ، إذ يبدأ بعرض مشكلة البحث التي تلقي الضوء على آلة العود التي يرجع تاريخ ضهورها في الحياة الموسيقية إلى العصر الأكدي ، في العراق القديم ، ثم أنتقلت لاحقاً إلى الأقطار المجاورة والقريبة في عصور ما قبل الإسلام .         وفي العصور الإسلامية المتتالية أزدهر الفن الموسيقي ، وبخاصة في العصر العبا

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 20 2021
Journal Name
Plant Archives
New Irrigation Techniques for Precision Agriculture: A Review
...Show More Authors

Precision irrigation applications are used to optimize the use of water resources, by controlling plant water requirements through using different systems according to soil moisture and plant growth periods. In precision irrigation, different rates of irrigation water are applied to different places of the land in comparison with traditional irrigation methods. Thus the cost of irrigation water is reduced. As a result of the fact that precise irrigation can be used and applied in all irrigation systems, it spreads rapidly in all irrigation systems. The purpose of the Precision Agriculture Technology System (precision irrigation) , is to apply the required level of irrigation according to agricultural inputs to the specified location , by us

... Show More
Preview PDF