The thirties and the early forties and the at end of the World War II of the last century
witnessed several attempts carried out by the Public Health Directorate and by the Iraqi
Ministry of Foreign Affairs to persuade the Rockefeller Foundation to fund Iraq with its
health program which is carried out in several regions in the world to promote the health and
social situations since Iraq during that period in history was badly in need to such plans and
programs because of this lack of financial and technical possibilities necessary for the
advancement of health and social dire situation.
The details of these attempts are deposited in the documents of the diplomatic mail
records of the United States of America , and documents of the Middle East, Iraq 1925- 1944
saved in the Iraqi National Library and Archive. We were able to obtain unique information
and it was a catalyst for us to fathom there where were no signs of this information here and
there.
Overall, these documents are a correspondence conducted between the Iraqi Ministry
of Foreign Affairs and the Rockefeller Foundation for charity by the US Office in Baghdad.
The research finds out that the view that Iraq was largely hopeful to be included in the
Rockefeller Foundation for charity programs for the advancement of its own health
deteriorated situation , and it seems that the global economic crisis that hit the United States
of America in the thirties of the last century had the impact on the Rockefeller Foundation for
charity and its preoccupation with the activities of supporting the US military in the years of
World war II , as well as a the engagement of the foundation with the implementation of the
Foundation charitable projects in various regions of the world has hampered the inclusion of
Iraq to their programs in the health field operations.
A roundabout is a highway engineering concept meant to calm traffic, increase safety, reduce stop-and-go travel, reduce accidents and congestion, and decrease traffic delays. It is circular and facilitates one-way traffic flow around a central point. The first part of this study evaluated the principles and methods used to compare the capacity methods of roundabouts with different traffic conditions and geometric configurations. These methods include gap acceptance, empirical, and simulation software methods. Previous studies mentioned in this research used various methods and other new models developed by several researchers. However, this paper's main aim is to compare different roundabout capacity models for acceptabl
... Show MoreHygienic engineering has dedicated a lot of time and energy to studying water filtration because of how important it is to human health. Thorough familiarity with the filtration process is essential for the design engineer to keep up with and profit from advances in filtering technology and equipment as the properties of raw water continue to change. Because it removes sediment, chemicals, odors, and microbes, filtration is an integral part of the water purification process. The most popular technique for treating surface water for municipal water supply is considered fast sand filtration, which can be achieved using either gravity or pressure sand filters. Predicting the performance of units in water treatment plants is
... Show MoreThe differential protection of power transformers appears to be more difficult than any type of protection for any other part or element in a power system. Such difficulties arise from the existence of the magnetizing inrush phenomenon. Therefore, it is necessary to recognize between inrush current and the current arise from internal faults. In this paper, two approaches based on wavelet packet transform (WPT) and S-transform (ST) are applied to recognize different types of currents following in the transformer. In WPT approach, the selection of optimal mother wavelet and the optimal number of resolution is carried out using minimum description length (MDL) criteria before taking the decision for the extraction features from the WPT tree
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreThe increasing demand for energy has encouraged the development of renewable resources and environmentally benign fuel such as biodiesel. In this study, ethyl fatty esters (EFEs), a major component of biodiesel fuel, were synthesized from soybean oil using sodium ethoxide as a catalyst. By-products were glycerol and difatty acyl urea (DFAU), which has biological characteristics, as antibiotics and antifungal medications. Both EFEs and DFAU have been characterized using Fourier transform infrared (FTIR) spectroscopy, and 1H nuclear magnetic resonance (NMR) technique. The optimum conditions were studied as a function of reaction time, reactant molar ratios, catalyst percentage and the effect of organic solvents. The conversion ratio of soybea
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More