Hypocrisy is found in various aspects of life, whether in religion, politics, or social parts. Hence, some of the church's hypocrisy is an outcome of different ups and downs in life. Starting with the problem in the novel, some of the hypocritical pastors engaged in an immense role in affecting the folk's lives because they persuaded people that God ordered them to do so. To accomplish their personal interests, the abusive monks disguise their verbal speech, smiles, and fine clothes like mild sheep to delusional followers, leaving them with guilt, shame, and spiritual scars. The present study aims to examine the hypocrisy and heresy of the church as portrayed in Okezie Nwoka's novel entitled God of Mercy. It reflects the source of corruption and heresy in some churches in a way that the corrupted priest adopts different brainwashing strategies to deceive their victims. Furthermore, the false priests are trying to force their doctrine on their cults. In the current study, the researcher relied on the Marxism theory to analyze the novel, the theory concentrates on Karl Marx's ideas of superstructure and base and how false religion can be used as a dangerous weapon by hypocrites and avid priests. The findings of the study revealed that hypocrisy and heresy were well portrayed in the Okezie Nwoka novel. It depicted how religion and priests do not always serve God's call. The author presented religion as a dangerous weapon and the victims reached their downfall by following a twisted offender. The fraud monks were pictured as caring only about themselves, their reputation, and their wealth. Also, they intended to follow false doctrine and quote unbiblical phrases to maintain their prosperity.
This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing i
... Show MoreIn the 1970s, the world knew the long-tailed nesokia Nesokia bunnii (Khajuria, 1981) (Rodentia, Muridae) from the Mesopotamian marshes of Garden of Eden in Southern Iraq. This distinct rodent was known from only five voucher specimens collected at the confluence of Tigris and Euphrates Rivers in southern Iraq while its occurrence in Southwestern Iran had
never been reported. In the 1990s, a large extent of its natural habitat was catastrophically desiccated and the animal was last seen in the 1970s. Since then, the status of this elusive rodent was shrouded in mystery. In 2007, an extraordinary photograph of a carcass of this species came to the light from Hawizeh Marsh which was interpreted as concrete evidence of the species’ pers
The present paper aims at evaluating the vailability quality and future horizons of potable water in the city of Shatra as a model. This is done in accordance with certain subjective and objective factors alongside the classification map of Shatra as a residential area. This system follows geographical studies specialized in urban construction. The problem of the present paper as well as the data approaching that problem have been chosen from the records of 2018. The researcher offered (919) questionnaire forms to be answered by a sample of dwellers in that area. Besides, the researcher also followed lab analysis of water samples collected from districts in the city of Shatra. GIS technology was also used to arrive at the real water shar
... Show MoreAge and growth of Varicorhinus damascinus (Val.) in Tigris river at Salahuldin province have been investigated. Monthly samples were taken during the period from September 1999 to August 2000, using small-meshed gill nets. The age data showed that there were six age groups and the dominant age groups were (III – IV) for both sexes. The results of the present study revealed that the increment in length of V. damascinus at the sites of study showed a tendency to decrease with the increase in age, after the third year of life in both sexes. The length-weight relationship of males and females were calculated and demonstrated in a straight line logarithmic formula, as follows: Log W = 1.5404 + 2.6885 log L for males r = 0.95 (P > 0.05) Log
... Show MoreEntrepreneurial events are understood to be imperious in accelerating the economic development of nations owing to a large number of jobs it creates. Thus, both developed and developing countries understand the importance of entrepreneurship education to instil student interest in entrepreneurial action. This study investigates the moderating effect of entrepreneurship education (EEP) on the relationship between attitude (ATT), subjective norms (SNMS), and perceived behavioural control (PBC) towards entrepreneurship intention (EINT) of university undergraduate students. The study population covered 794 students from all the four faculties of Northwest University Kano, that were taught a compulsory entrepreneurship education course in their
... Show MoreThe literature shows conflicting outcomes, making it difficult to determine how e-learning affects the performance of students in higher education. The effect of e-learning was studied and data has been gathered with the utilization of a variety of qualitative and quantitative methods, especially in relation to students' academic achievements and perceptions in higher education, according to literature review that has been drawn from articles published in the past two decades (2000-2020). The development of a sense of community in the on-line environment has been identified to be one of the main difficulties in e-learning education across this whole review. In order to create an efficient online learning community, it could be claim
... Show MoreBackground: Periodontal diseases (PD) are common chronic inflammatory diseases caused by pathogenic microorganisms colonizing the gingival area and inducing local and systemic elevations of pro-inflammatory cytokines resulting in tissue destruction by a destructive inflammatory process. Stress was considered as one of the important risk factors that cause many inflammatory diseases including PD. The purpose of this study wasto determines and compares clinical periodontal parameters (PLI, GI and BOP), stress level and salivary IL-1? level among dental students before, during and after mid-year exam, also to find the correlation among stress, IL-1? and clinical periodontal parameters. Materials and methods: The sample was consisted of 24 dent
... Show MoreBackground: Adolescence is one of the most dynamic stages of human development. However, Oral health is an integral part of public health, significantly impacts on the quality of life. OHE program is an important issue that should be given to them. The aim of this study was to evaluate oral health outcomes on adolescents' oral health by teachers and mothers Materials and Methods: The study was carried out in seven schools of Diyala - Baquba city. This 14-weeks duration study assessed the effectiveness of school OHE program on oral hygiene status, gingival health, and halitosis assessment of 80, 12 year-old, both genders of school adolescents. From the selected schools, one group was supervised by the teachers and the other was supervised
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More