The thirties and the early forties and the at end of the World War II of the last century
witnessed several attempts carried out by the Public Health Directorate and by the Iraqi
Ministry of Foreign Affairs to persuade the Rockefeller Foundation to fund Iraq with its
health program which is carried out in several regions in the world to promote the health and
social situations since Iraq during that period in history was badly in need to such plans and
programs because of this lack of financial and technical possibilities necessary for the
advancement of health and social dire situation.
The details of these attempts are deposited in the documents of the diplomatic mail
records of the United States of America , and documents of the Middle East, Iraq 1925- 1944
saved in the Iraqi National Library and Archive. We were able to obtain unique information
and it was a catalyst for us to fathom there where were no signs of this information here and
there.
Overall, these documents are a correspondence conducted between the Iraqi Ministry
of Foreign Affairs and the Rockefeller Foundation for charity by the US Office in Baghdad.
The research finds out that the view that Iraq was largely hopeful to be included in the
Rockefeller Foundation for charity programs for the advancement of its own health
deteriorated situation , and it seems that the global economic crisis that hit the United States
of America in the thirties of the last century had the impact on the Rockefeller Foundation for
charity and its preoccupation with the activities of supporting the US military in the years of
World war II , as well as a the engagement of the foundation with the implementation of the
Foundation charitable projects in various regions of the world has hampered the inclusion of
Iraq to their programs in the health field operations.
KE Sharquie, AA Khorsheed, AA Al-Nuaimy, Saudi Medical Journal, 2007 - Cited by 91
the electron correlation effect for inter-shell can be described by evaluating the fermi hole and partial fermi hole for Li atom comparing with Be+ and B+2 ions
Dora petroleum refinery waste water is the one of the important source of pollution by priority pollutant aromatic compound discharged to Tigris river in Iraq. the station has waste water treatment unit contains many treatment subunits The most important sub units is :skimmer units ,physiochemical unit ,daf unit, biological unit. The aim of research project is to study the ability of unit to remove the priority pollutant aromatic compound and follow up these compounds in river to study ability of river to self removal. A solid phase extraction (SPE) followed by high performance liquid chromatography-ultra violet (HPLC-UV) technique is depicted for the quantitative estimation of benzidines and phenols. Experimental studies were performed to
... Show MoreMany numerical approaches have been suggested to solve nonlinear problems. In this paper, we suggest a new two-step iterative method for solving nonlinear equations. This iterative method has cubic convergence. Several numerical examples to illustrate the efficiency of this method by Comparison with other similar methods is given.
Purpose: The concept of complete street is one of the modern trends concerned with diversifying means of transportation and reducing the disadvantages of mechanical transportation modes. This paper discusses the role of complete streets can play in developing the urban environment in the Alyarmok District of Baghdad. Method/design/approach: The linear regression method used to analyze the opinions of 100 respondents surveyed in the study area in order to find the relationship between the urban environment and the complete street elements. Theoretical framework: The Modern trends in urban planning aim to find alternatives to the policies of traditional transportation planning that focus on vehicular mobi
... Show MoreFreedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
The present work describes guggul as a novel carrier for some anti-inflammatory drugs. Guggulusomes containing different concentration of guggul with aceclofenac were prepared by sonication method and characterized for vesicle shape, size, size-distribution, pH, viscosity, spread ability, homogeneity, and accelerated stability in-vitro drug permeation through mouse skin. The vesicles exhibited an entrapment efficiency of 93.2 ± 12%, vesicle size of 0.769 ± 3μm and a zeta potential of - 6.21mV. In vitro drug release was analyzed using Franz’s diffusion cells. The cumulative release of the guggulusomes gel (G2) was 75.8% in 18 hrs, which is greater than that all the gel formulation. The stability profile of prepare
... Show MoreFading channel modeling is generally defined as the variation of the attenuation of a signal with various variables. Time, geographical position, and radio frequency which is included. Fading is often modeled as a random process. Thus, a fading channel is a communication channel that experiences fading. In this paper, the proposed system presents a new design and simulate a wireless channel using Rayleigh channels. Rayleigh channels using two approaches (flat and frequency-selective fading channels) in order to calculate some path space loss efforts and analysis the performance of different wireless fading channel modeling. The results show that the bite error rate (BER) performance is dramatically improved in the value of signal to
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More