Muslim doctors have long spared no effort in diagnosing the various embryonic diseases that have afflicted the fetus since its early days in his mother's womb. The most important of these
ABSTRACT
The research aim is to determine the relation between governmental consumption expenditure (GCE) & GDP in Iraq for the period 1981-2006.
The research has determined the scale of optimization for (GCE) & try to know the extent productivity of this expenditure and using the long run &short run model to test .The results clarify the following
1-The marginal productivity for the (GCE) is positive so it is productive.
2-The (GCE) in Iraq is too high because the marginal productivity for the expenditure less than 1.
3- The (GCE) percentage to GNP is
... Show MoreIn this work, the relationship between the ionospheric parameters (Maximum Usable Frequency (MUF), Lowest Usable Frequency (LUF) and Optimum working Frequency (OWF)) has been studied for the ionosphere layer over the Iraqi zone. The capital Baghdad (44.42oE, 33.32oN) has been selected to represent the transmitter station and many other cities that spread over Iraqi region have represented as receiver stations. The REC533 communication model considered as one of the modern radio broadcasting version of ITU has been used to calculate the LUF parameter, while the MUF and OWF ionospheric parameters have been generated using ASAPS international communication model which represents one of the most advanced and
... Show MoreThe phenomenon of spatial variation in the economic, social and urban development levels is considered prevalent in most of the economic and social systems,this relates to the concentration of most of those activities in certain regions and because of their rarity in other regions , that led to the emergence of the problem of the sharp contrast between the most developed areas and least developed areas within the same region or within the regions of the same country,
Reduction of this variables , in addition to the development of areas through following up and relying on an effective regional development enabling to reduce unemployment as well as to stop the migration of the unplanned for population,
And the ideal use of available
The trade war, of course, leads to a sharp tension in international relations because the economy is the lifeblood of the states. In the world of trade and economy, countries began to lean towards cooperation. Economic relations after World War II were more liberal, trade barriers were removed and global trade became more flexible and smooth
The present study was conducted to investigate the relationship between critical thinking, epistemological beliefs, and learning strategies with the academic performance of high school first-grade male and female students in Yazd. For this purpose, from among all first-grade students, as many as 250 students (130 females and 120 males) were selected by using multistage cluster sampling. The data needed were then collected through using California Critical Thinking Skills Test, Schommer's Epistemological Beliefs Questionnaire, Biggs’ Revised Two Factor Study Process Questionnaire. The findings indicated that there is a positive significant relationship between critical thinking and academic performance and achievement. Moreover, four fa
... Show MoreIn this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactan
... Show MoreIt was the most important weapons that were used during the long cultural war standing against Islam, it is interesting colonists Muslim women special attention, and directed to lure women rebellion against religion, and go out on their own teachings in this religion,
Carbon nanotubes (CNTs) were synthesized via liquefied petroleum gas (LPG) as precursor using flame fragments deposition (FFD) technique. In vitro, biological activates of carbon nanotubes (CNTs) synthesized by FFD technique were investigated. The physiochemical characterizations of synthesized CNTs are similar to other synthesized CNTs and to the standard sample. Pharmaceutical application of synthesized CNTs was studied via conjugation and adsorption with different types of medicines as promote groups. The conjugation of CNTs was performed by adsorption the drugs such as sulfamethoxazole (SMX) and trimethoprim (TMP) on CNTs depending on physical properties of both bonded parts. The synthesized CNTs almost have the same performance in a
... Show MoreIn this article, a new deterministic primality test for Mersenne primes is presented. It also includes a comparative study between well-known primality tests in order to identify the best test. Moreover, new modifications are suggested in order to eliminate pseudoprimes. The study covers random primes such as Mersenne primes and Proth primes. Finally, these tests are arranged from the best to the worst according to strength, speed, and effectiveness based on the results obtained through programs prepared and operated by Mathematica, and the results are presented through tables and graphs.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos