The study aims to identify the theoretical literature for all the variables of the study (ICT, GDP) as well as to identify the practical side of the impact of ICT on the per capita GDP in Iraq for the period (2004-2021). The study was based on the hypothesis that ICT impacts per capita GDP in Iraq. The problem of the study was to answer the question: does ICT contribute to per capita GDP? The study concluded that an increase in the rate of internet users per 100 people by one unit would increase. Increasing the landline telephone rate per 100 people by one unit will increase GDP per capita. In addition, increasing the mobile phone rate per 100 people by one unit will increase GDP per capita. The study recommended adopting rational policies to ensure the application of the results of the development of information technology to the policies adopted by governments in the manner and quality of Use and put at the service of development
Education around the world has been negatively affected by the new coronavirus disease (COVID-19) pandemic. Many institutions had to transition to distance learning in compliance with the enforced safety measures. Distance learning might work well for settings with stable internet connections, professional technical teams, and basic implementation of technology in education. In contrast, distance learning faces serious challenges in less fortunate settings with inferior infrastructure. This report aims to shed light on the immediate action steps taken at a leading pharmacy school in Iraq to accommodate for the enforced changes in pharmacy education. The University of Baghdad College of Pharmacy went from less than minimal technology impl
... Show MoreAdsorption studies were carried out to test the ability of the Iraqi rice bran (Amber type) to adsorb some metals divalent cations (Cd2+, Co2+, Cu2+, Fe2+, Ni2+, Pb2+, and Zn2+) as an alternative tool to remove these pollutants from water. The Concentrations of these ions in water were measured using flame and flamless atomic absorption spectrophotometry techniques. The applicability of the adsorption isotherm on Langmuir or Freundlisch equation were tested and found to be dependent on the type of ions. The results showed different adsorptive behavior and different capacities of the adsorption of the ions on the surface of the bran. The correlation between the amounts adsorbed and different cation parameters including (electronegativity, io
... Show MoreThe theater can be considered a media that the effectiveness of its tools and the perceptions it produces cannot be abandoned according to patterns or aesthetic artistic trends, and at the same time it carries a large amount of information that can be worked on activating it with conscious directions within the elements of the theatrical performance, and these can be counted The study is an attempt to trace the functioning of the communication and media elements in the structure of the theatrical performance, as the study included: An introduction that defines the research problem and its importance, which crystallized around the following question: Does the media communication through theatrical presentation form its desired effectivene
... Show MorePolymeric hollow fiber membrane is produced by a physical process called wet or dry/wet phase inversion; a technique includes many steps and depends on different factors (starting from selecting materials, end with post-treatment of hollow fiber membrane locally manufactured). This review highlights the most significant factors that affect and control the characterization and structure of ultrafiltration hollow fiber membranes used in different applications. Three different types of polymers (polysulfone PSF, polyethersulfone PES or polyvinyl chloride PVC) were considered to study morphology change and structure of hollow fiber membranes in this review. These hollow fiber membranes were manufactured with different proce
... Show MoreThe provided research paper offers a thorough analysis of the semiotic analysis present in tobacco-free initiative advertisements from the year 2021. The study delves into the intricate process of decoding the diverse signs, symbols, and visual components integrated into these anti-smoking campaigns. The core aim of this investigation is to comprehend and explore the semiotic tactics that underlie these advertisements, with a particular emphasis on visual communication as a pivotal tool in shaping the public's attitudes and behaviors towards tobacco usage. The research introduces a significant theoretical framework, the "Taxonomy of Image-Text Relations and Functions" theory, as proposed by Emily E. Marsh and Marilyn Dom
... Show MoreThis paper aims to build a modern vision for Islamic banks to ensure sustainability and growth, as well it aims to highlight the positive Iraqi steps in the Islamic banking sector. In order to build this vision, several scientific research approaches were adopted (quantitative, descriptive analytical, descriptive). As for the research community, it was for all the Iraqi private commercial banks, including Islamic banks. The research samples varied according to a diversity of the methods and the data availability. A questionnaire was constructed and conducted, measuring internal and external honesty. 50 questionnaires were distributed to Iraqi academic specialized in Islamic banking. All distributed forms were subject to a thorough analys
... Show MoreBackground: Endodontically treated teeth have low resistance to fracture against occlusal forces. The strengthening effect of bonded esthetic onlay restoration on weakened tooth has been reported. This study aimed to assess the fracture resistance of endodontically treated premolars restored with composite with and without cuspal coverage by using direct and indirect techniques. Indirect technique done by CAD/CAM system (computer aided design –computer aided manufacturer) and laboratory processing. Material and methods: Forty human extracted maxillary premolars of approximately comparable sizes were divided into four groups: Group (A): Ten endodontically treated teeth directly filled with Filtek Z250xt without cuspal coverage. Group
... Show MoreThis study used a continuous photo-Fenton-like method to remediate textile effluent containing azo dyes especially direct blue 15 dye (DB15). A Eucalyptus leaf extract was used to create iron/copper nanoparticles supported on bentonite for use as catalysts (E@B-Fe/Cu-NPs). Two fixed-bed configurations were studied and compared. The first one involved mixing granular bentonite with E@B-Fe/Cu-NPs (GB- E@B-Fe/Cu-NPs), and the other examined the mixing of E@B-Fe/Cu-NPs with glass beads (glass beads-E@B-Fe/Cu-NPs) and filled to the fixed-bed column. Scanning electron microscopy (SEM), zeta potential, and atomic forces spectroscopy (AFM) techniques were used to characterize the obtained particles (NPs). The effect of flow rate and DB15 concent
... Show MoreThis research aims to conduct a linguistic analysis of the translation of the novel "The Corpse Washer" by the Iraqi author Sinan Antoon. The main objective is to explore the challenges and strategies involved in translating this literary work, particularly the difficulties in translating the Baghdadi dialect and the obstacles it poses for non-native speakers. Employing a descriptive research methodology, the study examines the linguistic aspects of the translation, specifically selected conversational texts in the novel. It identifies the difficulties faced by translators in preserving the essence of the original novel and presents instances where errors occurred in translating vocabulary, conversational expressions, proverbs, and idi
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show More