Preferred Language
Articles
/
jkmc-744
COVID-19 and the Conspiracy Theories
...Show More Authors

The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Calibration and verification of the hydraulic model for Blue Nile river from Roseires dam to Khartoum city
...Show More Authors

This research represents a practical attempt applied to calibrate and verify a hydraulic model for the Blue Nile River. The calibration procedures are performed using the observed data for a previous period and comparing them with the calibration results while verification requirements are achieved with the application of the observed data for another future period and comparing them with the verification results. The study objective covered a relationship of the river terrain with the distance between the assumed points of the dam failures along the river length. The computed model values and the observed data should conform to the theoretical analysis and the overall verification performance of the model by comparing it with anothe

... Show More
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Comparison of Mercury Intrusion and Nitrogen Adsorption Measurements for the Characterization of Certain Natural Raw Materials Deposits
...Show More Authors

The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 06 2016
Journal Name
Chalcogenide Letters
THEORETICAL MODELING OF THE ELECTRONIC PROPERTIES CORE AND SURFACE OF CdSe1-xTex CHALCOGENIDE NANOCRYSTALS VIA DFT CALCULATION
...Show More Authors

Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
The Effect of a Mediator on Scaffolding EFL Student Teachers’ Teaching Competencies, Self- Efficacy and Self–Awareness
...Show More Authors

This study aims to find out the effect of the mediator on scaffolding fourth yearstudent- teachers' teaching competencies and their self-efficacy. The present study combines scaffolding and self-efficacy by using a mediator on scaffolding students affects teaching competencies and selfefficacy and from the results of which the existence of student-teachers’ selfawareness was ensured as an effect of the same independent variable. The model affects their teaching competencies and led them to be aware of the needs of their pupils and themselves. 

View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Business And Technopreneurship
Assessment of Entrepreneurship Education on the Relationship Between Attitude, Subjective Norms, Perceived Behavioural Control and Entrepreneurial Intention
...Show More Authors

Entrepreneurial events are understood to be imperious in accelerating the economic development of nations owing to a large number of jobs it creates. Thus, both developed and developing countries understand the importance of entrepreneurship education to instil student interest in entrepreneurial action. This study investigates the moderating effect of entrepreneurship education (EEP) on the relationship between attitude (ATT), subjective norms (SNMS), and perceived behavioural control (PBC) towards entrepreneurship intention (EINT) of university undergraduate students. The study population covered 794 students from all the four faculties of Northwest University Kano, that were taught a compulsory entrepreneurship education course in their

... Show More
Publication Date
Sat Jun 01 2013
Journal Name
Int. J. Nanoelectronics And Materials
Comparsion of the physical properties for CdS and CdS doped PVA thin films prepared by spray pyrolysis
...Show More Authors

Preview PDF
Publication Date
Wed Mar 30 2022
Journal Name
College Of Islamic Sciences
Judge's Preaching to the Litigants and Witnesses An Applied Doctrinal Study on Judicial Decisions of Saudi Courts
...Show More Authors

Abstract

Praise be to Allah and prayers and peace be upon our Prophet, Muhammad, his family and all of his companions,

This research addresses the issue of judge's preaching to the litigants and witnesses; it is a very significant issue since the judge cannot know the insides and facts, but it issues judgments based on the hearings. Since people are originally wrong-doing and ignorant, they, therefore, commit injustice, oppression, false adversarial, and false testimony. However, some people can possibly retreat and return to the right, after being inattentive or recalcitrant, by preaching. This fact led scholars to talk about the judge's preaching to litigant and witnesses and this research is conducted

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Al-kindy College Medical Journal
Alterations in some Physiological and Inflammatory Markers in Iron-Deficient Obese Adults in the Kurdistan Region, Iraq
...Show More Authors

Background: Iron homeostasis is crucial to many physiological functions in the human body, such as cellular activity, erythropoiesis, and the innate immune response. Iron deficiency anemia may occur from obesity's ability to disturb iron homeostasis. Obesity may be seen as a pre-inflammatory condition with mild, ongoing systemic inflammation. Additionally, an increase in hepcidin levels by chronic inflammation causes iron insufficiency in obese people. For this reason, this current experiment is designed to investigate the iron profile and some hematological and inflammatory parameters in obese adults in the Kurdistan region-Iraq.

Subjects and Methods: The cross-sectional study w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 08 2018
Journal Name
Modeling Earth Systems And Environment
Sedimentary units-layering system and depositional model of the carbonate Mishrif reservoir in Rumaila oilfield, Southern Iraq
...Show More Authors

View Publication
Crossref (16)
Crossref