Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power conversion efficiency (PCE) at 1.37%, as determined by measuring the short circuit current (Jsc), open-circuit voltage (Voc), and fill factor (FF) (Jsc = 2.24 mA cm-2, Voc = 0.80 mV, FF = 76.5%). Meanwhile, compound 5c exhibited the lowest PCE at 0.94% (Jsc = 1.55 mA cm-2, Voc = 0.750 mV, FF = 76.4%).
Abstract
The research to have a clear perceptions about the knowledge value added to assess the knowledge resources of the Iraqi private banks, depending on the value added methodology of the proposed defined (Housel & Bell, 2001), which assumes that the knowledge value added come through synergetic relationship between knowledge resource and information technology, trying to the possibility of mainstream theory and its application in the Iraqi environment and interpretation of results, and on this basis was launched search of a research problem took root synergetic nature of the relationship between knowledge (human) resource and
... Show MoreThe analysis of the orientations of Iraqi art commodification contributed to the discovery of deliberation, which was founded in the deliberative discourse in the trends towards commodification in the Iraqi art, since the important transformations in social structures and relations produced a dictionary with new vocabulary and tools that replaced the traditions and norms that have been in circulation for a century. Deliberation and commodification have become more prevalent in the mechanics and trends of the art where the pace of change is becoming increasingly frantic towards the market. The general market for art constitutes one of the most effective phenomena within contemporary art, that there has been a proliferation of sales auctio
... Show MoreThe purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
As material flow cost accounting technology focuses on the most efficient use of resources like energy and materials while minimizing negative environmental effects, the research aims to show how this technology can be applied to promote green productivity and its reflection in attaining sustainable development. In addition to studying sustainability, which helps to reduce environmental impacts and increase green productivity, the research aims to demonstrate the knowledge bases for accounting for the costs of material flow and green productivity. It also studies the technology of accounting for the costs of material flow in achieving sustainable development and the role of green productivity in achieving sustainable development. According
... Show MoreIn the present work, 9-fluorenone-2-carboxylic acid methyl ester (1) was prepared from 9-fluorenone-2-carboxylic acid and then converted into the acid hydrazide (2). Compound (2), is the key intermediate for the synthesis of several series of new compounds such as substituted 1,3,4-oxadiazole derivatives (3-6) were synthesized from the condensation of different substituted benzoic acids with compound (2) using POCl3 as condensing agent. Treatment of compound (2) with formic acid gave the N-formyl hydrazide (7), which upon refluxing with phosphorous pentoxide in benzene yielded the corresponding 5-(9-fluorenone-2-yl)-1,3,4-oxadiazole (8). Reaction of hydrazide (2) with phenyl isocyanate to give N-phenyl semicarbazide derivative (9), then thi
... Show MoreThe primary objective of this study was to identify the obstacles and problems encountered in the work of sports clubs according to the reality of the application of administrative automation. The present study was conducted in the sports club headquarters of Baghdad within the timeframe of October 2021 to December 2021. In the present study, a descriptive approach was used by the researchers in an analytical style according to the nature of the problem to be studied. The research community of the current study was composed of 100 sports clubs in the governorate of Baghdad. A total of 80 questionnaires were filled by the sample participants, who represented a percentage of 80% of the research community. After processin
... Show MorePoly (3-hydroxybutyrate) (PHB) is a typical microbial bio-polyester reserve material; known as “green plastics”, which produced under controlled conditions as intracellular products of the secondary metabolism of diverse gram-negative/positive bacteria and various extremophiles archaea. Although PHB has properties allowing being very attractive, it is too expensive to compete with conventional and non-biodegradable plastics. Feasibility of this research to evaluate the suitability of using a watermelon-derived media as an alternative substrate for PHB synthesis under stress conditions was examined. Results, include the most nutrients extraction, indicated that the watermelon seeds contain a high content of nutrients makes them a promisi
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More