Theoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
Background: Aesthetic archwires are used to overcome the aesthetic problems of stainless steel wires but the color of the coating layer can be changed with time when exposed to oral environments. The aim of this study was to evaluate the degree of color change of different aesthetic archwires from different companies under different coloring solutions. Materials and Methods: One hundred fifty samples of coated archwires from three companies (Highland, G&H and Dany) were immersed in 5 solutions (artificial saliva, turmeric, tea, coffee and Miranda) to evaluate the degree of color changes after 7, 14 and 21 days using visible spectrophotometer. Data were collected and analyzed using one way ANOVA and post hoc Tukey’s tests. Resu
... Show MoreThis research considers the preservation of environment through recycling old toys. This is achieved by transforming the old toys into educational clothing accessories for kindergarten stages. The research methodology adapts both descriptive and applied approaches. The research questionnaire targeted a sample of 35 teachers to collect information about the waste toys in kindergarten. Also, another sample of 30 teachers and mothers were targeted to measure the suitability of the clothing designs for the early childhood stages. The results shows that both teachers and mothers were well satisfied with clothing accessories designed with the toys waste. This concept contributes to limiting the pollution caused by toys and could save time, eff
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreBackground: Poly cystic ovary syndrome is a common disorder in women of reproductive age, it is associated with disturbance of reproductive, endocrine and metabolic functions. The pathophysiology of PCOS appears to be multifactorial and polygenic. Leptin seems to play an important role in pathophysiology of PCOS especially in women with BMI ≥25kg/m2. Objectives: To assess leptin level in both PCOS and healthy women and explore the relation to their body weight and body mass index. Patient and Methods: A total of 120 women were enrolled in this study, 60 women (50%) had PCOS (study group) and the reminder 60 women (50%) were healthy women and considered as control group. BMI was calculated first. Both groups were further sub
... Show MoreVisceral leishmaniosis is one of the most fatal old-world neglected disease with estimated 90 thousand worldwide cases emerge each year. In Iraq, the cutaneous and visceral form are endemic but available chemotherapies are either toxic with diverse side effects, expensive available drugs or parasite …
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreTaken the word the word God itself the task when the Muslim calligraphers because of its holiness and majesty and altitude, so take Calligraphers innovate in their design, which represents the images and forms experiencing them prolific artistic output to highlight the aesthetic value through the use of Kufic script which is one of the most prominent lines his susceptibility diversity decorative Add the possibility of extending the letters in different directions because of the vision calligrapher aesthetic and an investigation is required for the word of the design, so the researcher examined by dividing into four chapters,Was the first research problem and the importance and goals and identify the term, while the second chapter was div
... Show MoreLeft ventricular hypertrophy (LVH) caused by high blood pressure is linked to increased mortality and arrhythmia risk. This study aimed to evaluate arrhythmia in hypertensive patients due to left ventricular hypertrophy (LVH). A cross-sectional study was performed, assessing participants' blood pressure, echocardiography and electrocardiography, and Holter monitoring in certain cases. There were 300 hypertensive patients >18 years attending the cardiology unit of Baghdad medical city. The study was conducted between January–June 2022. The electrocardiograms at rest for 300 adults with hypertension were investigated. 130 (43.5%) were females, and 170 (56.5%) were males. The mean age of participants was 58 years. Forty-nine (16.3
... Show More