The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.
Metaheuristics under the swarm intelligence (SI) class have proven to be efficient and have become popular methods for solving different optimization problems. Based on the usage of memory, metaheuristics can be classified into algorithms with memory and without memory (memory-less). The absence of memory in some metaheuristics will lead to the loss of the information gained in previous iterations. The metaheuristics tend to divert from promising areas of solutions search spaces which will lead to non-optimal solutions. This paper aims to review memory usage and its effect on the performance of the main SI-based metaheuristics. Investigation has been performed on SI metaheuristics, memory usage and memory-less metaheuristics, memory char
... Show MoreHedging is a linguistic avoidance of full commitment or precision. It is the use of a vague language. The main objectives of this study are to
... Show MoreThe problem of rebellion is considered one of the features of rapid changes that a society undergoes in all spheres and directions of life, especially in the realm of social relations, customs, traditions, values, and principles. Rebellion may manifest itself in rebellion against oneself, against values or traditions, or against social or governmental authority. One may find that submission plays a vital role in all of these interactions. This study deals with the problem of rebellion in the works of two renowned authors: The French Gustave Flaubert and the Israeli Amos Oz, through two main characters who share similar qualities and traits. Emma Bovary and Henna Konin demonstrate this through their rebellion against themselves, their relati
... Show MoreThis study addresses the issue of academic writing in English by comparing pragmatic argumentation in the writing of 40 graduate students studying at Iraqi universities (SSIU) with the writing of 40 graduate students studying at American universities (SSAU). In these 80 theses, six selected aspects of academic writing were analyzed: (a) paragraph structure, (b) length and construction of sentences, (c) organization of information in sentences, (d) vocabulary, (e) topic sentences, and (f) discourse markers. This study seeks to go beyond the traditional and often onedimensional analysis of pragmatics of argumentation in English academic writing to distinguish and describe different aspects of academic writing and their results when used by EF
... Show MoreThe struggle between two identities is a crucial subject everywhere. Some people travel abroad in quest of a new identity after struggling at home. People migrate and embrace a new identity for different reasons. They find themselves in a state of internal conflict as they navigate the tension between their newly adopted identities and their old ones. The individual is haunted and overwhelmed by their previous experiences. This research explores the universality of the subject matter by examining the motivations underlying the adoption of a new identity in a distinct geographical and temporal context. This paper examines the literary works of Kincaid's Lucy (1990) and Blasim's "The Nightmares of Carlos Fuentes" (2014). Kincaid’s pro
... Show MoreThis study aimed to study the inhibition activity of purified bacteriocin produced from the local isolation Lactococcuslactis ssp. lactis against pathogenic bacteria species isolated from clinical samples in some hospitals Baghdad city. Screening of L. lactis ssp. Lactis and isolated from the intestines fish and raw milk was performed in well diffusion method. The results showed that L. lactis ssp. lactis (Lc4) was the most efficient isolate in producing the bacteriocin as well observed inhibitory activity the increased that companied with the concentration, the concentration of the twice filtrate was better in obtaining higher inhibition diameters compared to the one-fold concentration. The concentrate
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreIn this research a theoretical study has been carried out on the behavior and strength of simply supported composite beams strengthened by steel cover plate taking into consideration partial interaction of shear connectors and nonlinear behavior of the materials and shear connectors. Following the procedure that already has been adopted by Johnson (1975), the basic differential equations of equilibrium and compatibility were reduced to single differential equation in terms of interface slip between concrete slab and steel beam. Furthermore, in order to consider the nonlinear behavior of steel, concrete and shear connectors, the basic equation was rearranged so that all terms related to materials are isol
... Show More