Within this paper, we developed a new series of organic chromophores based on triphenyleamine (TPA) (AL1, AL-2, AL-11 and AL-22) by engineering the structure of the electron donor (D) unit via replacing a phenyle ring or inserting thiophene as a π-linkage. For the sake of scrutinizing the impact of the TPA donating ability and the spacer upon the photovoltaic, absorptional, energetic, and geometrical characteristic of these sensitizers, density functional theory (DFT) and time-dependent DFT (TD-DFT) have been utilized. According to structural characteristics, incorporating the acceptor, π-bridge and TPA does not result in a perfect coplanar conformation in AL-22. We computed EHOMO, ELUMO and bandgap (Eg) energies by performing frequency a
... Show MoreMost of World nations are striving to provide the necessary needs to protect their economic properties assets against natural or abnormal disasters that may be inflicted on such property and the means that used by such countries to reduce the damages is insurance, whereas insurance as a system that collects and distributes different risks into the group thus to achieve a social symbiosis between individuals. The system works to transfer the risks from the individual to the group and then distributes the losses to all members of the group.
According to the importance of the insurance sector and the need to develop it as well as working on improving its performance, this search aims to identify the ac
... Show MoreChronic periodontitis (CP) is an inflammatory disease affecting tooth supporting structures in response to bacterial dental plaque causing irreversible tissue destruction. Cyclooxygenase-2 (COX-2) is an effective mediator in the pathogenesis of periodontitis. Polymorphisms in the COX-2 gene may contribute to its overexpression and increased disease susceptibility. To evaluate the association between -1195 A/G single nucleotide polymorphism (SNP) in the promotor area of the cyclooxygenase-2(COX-2) gene and severity of chronic periodontitis in a sample of Iraqi population. -1195A/ G COX-2 SNP was investigated in 70 chronic periodontitis (CP) cases and 30 healthy controls. CP cases composed of 2 subgroups (35 moderate CP cases and 35 severe CP
... Show MoreThis research aims at recognizing the concept of Innovation in offering the banking services as well as the concept and dimensions of competitive advantage . And to identify and analyze the relationship ( correlation and impact ) between the concept of Innovation in offering the banking services and the dimensions of the competitive advantage under discussion . The research includes all Iraqi private banks in Baghdad city only of the (20) banks . The researcher adopted , in this study , a random sample of the distribution of the questionnaire to members of the research sample are managers , customers and employees in these banks , and were distributed ( 115 ) form questionnaire , ( 97 ) form w
... Show MoreAbstract
The problem with the search at the reduction of adoption of new products, as there are three hypotheses of research have been formulated , the first one is no significant correlation between the religious and differences to customers and adopt new products, and This Study Aimed To Investigate The Relationship Between Religious differences for customers And New Products Adoption, Applied On Arab Mall Commercial Customers/ Egypt, an Analytical Model Is Developed As Guideline To Test The The Relationship Between Religious differences for customers And New Products Adoption, Aquantative Method With Deductive Approach Were Chosen In This Research . In Order To Collect Primary Data, A questionnaire Is
... Show MoreThis study seeks to answer urgent questions about the role of new media that have emerged recently, such as the Internet and social networking sites and information services through mobile and others to increase awareness among young people, especially university students. during a field study that took place on a sample of students in the Department of Media at the University of Petra Kingdom of Jordan during the second semester in 2013 in the study the researcher finds increased attention and follow-up by young people for many of the world events and regional and local communities through exposure to a number of new media; in the forefront of the Internet and increase the level of awareness and interests young people do many of the eve
... Show MoreThe research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of common concepts in the field of communication and media. The researcher tries to find an analytical explanation of the relationship between technology by being an influential factor in building the information society, which is the basis of new media, and the technical output that influenced the forms of social relations and linguistic construction as a human communication tool. The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of comm
... Show MoreThis Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.
This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
هدفت الدراسة إلى التعرف على مستوى تقييم الإعلاميين العراقيين المقيمين في الأردن لتغطية الإصلاحات السياسية و الاقتصادية في العراق من قبل الفضائيات العراقية. و هدفت كذلك إلى التعرف على الف