Iraq faces significant economic challenges, owing in part to its reliance on oil revenue and the country's overburdened public sector. The supremacy of State-Owned Enterprises (SOEs), obstructive rules, a lack of access to finance, a shortage of skilled labor, and inadequate infrastructure all impede private sector growth. This research relied mainly on information from global development organizations, most markedly the World Bank, as well as policy documents, and it discovered a scarcity of pertinent educational writings. The following are the key findings of this research: Recent economic growth has not resulted in poverty reduction; the stretched history of war and insecurity in Iraq has hampered progress and development; the private sector is critical to creating jobs and promoting long-term growth; State-Owned Enterprise (SOEs) dominance; the bloated, inefficient government sector; laws and regulations impede the development of the private sector; and difficulties in obtaining financing. Future prospects to promote inclusive and long-term growth through SMEs sector in Iraq are also discussed in the paper.
This paper investigates the collocational use of irreversible food binomials in the lexicons of English (UK) and Arabic (Iraq), their word-order motivations, cultural background, and how they compare. Data consisted in sixteen pairs in English, versus fifteen in Arabic. Data analysis has shown their word order is largely motivated by logical sequencing of precedence; the semantically bigger or better item comes first and the phonologically longer word goes last. These apply in a cline of decreasing functionality: logical form first, semantic importance second, phonological form last. In competition, the member higher in this cline wins first membership. While the entries in each list clearly reflect culturally preferred food meals in the UK
... Show MoreEcolinguistics is a twofold field in which ecology and language are its two major concerns. That is, this field is concerned with the way through which our thoughts, ideologies and the like influence the environment. The present study aims at analyzing (6) constructive and destructive environmental advertisements to find out how the techniques of erasure and salience operate in these types of advertisements. It studies the linguistic expressions that achieve these techniques in the constructive and destructive advertisements. The qualitative and quantitative methods are exploited in the current study. Analyzing (6) constructive and destructive environmental advertisements in accordance with Stibbe’s (2015) model of salience and erasure
... Show MoreThe optimum separators operating pressure is determined by using flash calculations and equilibrium ratios. In this study, the optimum separator size for Jambur field is calculated by using equations introduced by Arnold and Stewart and API12J Specification [1]. Because Jambur field has a high production rate two conditions are taken in the study to determine separator size, first based on production rate 80,000 bbl/day and second based on split the production between two banks A and B (40,000 bbl/day for each bank). The calculation resulted in optimum separator pressure for the first stage of 700 psi, and the second stage of 300 psi, and the third stage of 120 psi. The results show that as the number of stages increased above three-stag
... Show MoreThe Arab Islamic Manuscripts in the science libraries humanly global heritage in different types of knowledge and science, as they were not confined to a particular flag but extended to include all kinds of science, and to facilitate the knowledge of these types of manuscripts has been necessary to operate them indexed in most libraries , because it is important in determining the size of those manuscripts and set them up and facilitate the work of the investigators, as well as the significance of indexing to know printed manuscripts in order to avoid repetition of the publication of the manuscript more than once, especially if the deployment is to be characterized by accurate scientific integrity and following the origins of the scienti
... Show MoreThe goal of this discussion is to study the twigged of pure-small (pr-small) sub- moduleof a module W as recirculation of a small sub-module, and we give some basic idiosyncrasy and instances of this kind of sub-module. Also, we give the acquaint of pure radical of a module W (pr-radical) with peculiarities.
The main aim of conducting this research is to identify the applications of Smart libraries in the Arab world. The Researcher relied on the documentary and Survey approach to collect information and data through the Internet, and to get to know these libraries. Then the Research came in three sections dealing with the first topic: The general framework of the study. The second topic deals with: introducing Smart libraries and indicating their types and characteristics. The Third topic dealt with the requirements of Smart libraries'application by identifying the basic components of it (Smart building, Smart Librarian , Smart devices, systems and software, Smart information sources,and Smart beneficiaries), and dealt with Smart libraries appl
... Show MoreAfter the persistence of the British policy of oppression and control over the American colonies and the attempts to obliterate the identity of their inhabitants, the colonies worked on moving forward towards achieving independence, and Virginia was the first to initiate the development of the new government frameworks, through George Mason in drafting the Virginia Bill of Rights in 1776, which expressed the philosophy of the era Enlightenment and independent revolutionary thought, which called for equality and natural rights for individuals and the need for a free popular government that works for the common good.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreBackground: Moringa peregrina is widely used in the traditional medicine of the Arabian Peninsula to treat various ailments, because it has many pharmacologically active components with several therapeutic effects. Objective: This study aimed to investigate the inhibitory effect of Moringa peregrina seed ethanolic extract (MPSE) against key enzymes involved in human pathologies, such as angiogenesis (thymidine phosphorylase), diabetes (α-glucosidase), and idiopathic intracranial hypertension (carbonic anhydrase). In addition, the anticancer properties were tested against the SH-SY5Y(human neuroblastoma). Results: MPSE extract significantly inhibited α-glucosidase, thymidine phosphorylase, and carbonic anhydrase with half-maximal i
... Show MoreIn this work, silver (Ag) self-metallization on a polyimide (PI) film was prepared through autocatalytic plating. PI films were prepared through the solution casting method, followed by etching with potassium hydroxide (KOH) solution, sensitization with tin chloride (SnCl2), and the use of palladium chloride (PdCl2) to activate the surface of PI. Energy-dispersive X-ray analysis (EDX) showed the highest peak in the (Ag) region and confirmed the presence of AgNPs. The diffraction peaks at 2θ = 38.2°, 44.5°, 64.6°, and 78.2° represented the 111, 200, 220, and 311 planes of Ag, respectively. The FT–IR an
... Show More