The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.
In this research, we present a nonparametric approach for the estimation of a copula density using different kernel density methods. Different functions were used: Gaussian, Gumbel, Clayton, and Frank copula, and through various simulation experiments we generated the standard bivariate normal distribution at samples sizes (50, 100, 250 and 500), in both high and low dependency. Different kernel methods were used to estimate the probability density function of the copula with marginal of this bivariate distribution: Mirror – Reflection (MR), Beta Kernel (BK) and transformation kernel (KD) method, then a comparison was carried out between the three methods with all the experiments using the integrated mean squared error. Furthermore, some
... Show MoreWithin connected speech, RP speakers tend to shorten stressed long vowels end diphthongs in pre. Forties consonants in the same syllable on the basis of complementary Distribution, i.e., the phonological environment decides the influence of the forties plosives and fricatives, as far as they are in find position preceded by stressed long vowels and diphthongs, or particular voiced consonants plus vowels. The Iraqi learners, then, face.
Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .
Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th
... Show MoreThe metric dimension and dominating set are the concept of graph theory that can be developed in terms of the concept and its application in graph operations. One of some concepts in graph theory that combine these two concepts is resolving dominating number. In this paper, the definition of resolving dominating number is presented again as the term dominant metric dimension. The aims of this paper are to find the dominant metric dimension of some special graphs and corona product graphs of the connected graphs and , for some special graphs . The dominant metric dimension of is denoted by and the dominant metric dimension of corona product graph G and H is denoted by .
The aim of the present research is to study the dissolution and transport process of
benzene as a light nonaqueous phase liquid (LNAPL) in saturated porous media.
Unidirectional flow at water velocities ranged from 0.90 to 3.60 cm/hr was adopted to study
this process in a three dimensional saturated sand tank (100 cm×40 cm×35 cm). This tank
represents a laboratory-scale aquifer. The aquifer was constructed by packing homogeneous
sand in the rectangular tank. The experimental results were used to characterize the
dissolution behavior of an entrapped nonaqueous phase benzene source in a three dimensional
aquifer model. The time invariant average mass transfer coefficient was determined at each
interstitial velocit
The aim of this study is to survey and make to revision the genera and species of Chloropidae fauna of Iraq. The investigation showed four species belonging four genera, which belongs to two subfamilies, and one unidentified species belonging to the genus Elachiptera Maquart, The specimens were compared with stored insects at Department of Entomology and invertebrates, Iraq Natural History Research Center and Museum.
The progress of network and multimedia technologies has been phenomenal during the previous two decades. Unauthorized users will be able to copy, retransmit, modify reproduction, and upload the contents more easily as a result of this innovation. Malicious attackers are quite concerned about the development and widespread use of digital video. Digital watermarking technology gives solutions to the aforementioned problems. Watermarking methods can alleviate these issues by embedding a secret watermark in the original host data, allowing the genuine user or file owner to identify any manipulation. In this study, lots of papers have been analyzed and studied carefully, in the period 2011–2022. The historical basis of the subject shou
... Show MoreHuge yearly investments were made by organizations for the development and maintenance. However, it has been reported that most of the IT projects fails as it is delayed, over budget and discontinued quality. A systematic literature review (SLR) was conducted to identify the critical success factors (CSFs) for the IT projects. Nine (9) CSFs was identified from the SLR. An online survey was conducted among 103 respondents from developers and IT managers. The data was analyzed using the Statistical Package for Social Science (SPSS 22). The findings showed that the highest CSFs of IT projects is commitment and motivation. Project monitoring was found the lowest score ranked by respondents.