The present work aims to fabricate n-i-p forward perovskite solar cell (PSC) withئ structure (FTO/ compact TiO2/ compact TiO2/ MAPbI3 Perovskite/ hole transport layer/ Au). P3HT, CuI and Spiro-OMeTAD were used as hole transport layers. A nano film of 25 nm gold layer was deposited once between the electron transport layer and the perovskite layer, then between the hole transport layer and the perovskite layer. The performance of the forward-perovskite solar cell was studied. Also, the role of each electron transport layer and the hole transport layer in the perovskite solar cell was presented. The structural, morphological and electrical properties were studied with X-ray diffractometer, field emission scanning electron microscope and current-voltage (J-V) characteristic curves, respectively. J-V curves revealed that the deposition of the Au layer between the electron transport layer (ETL) and Perovskite layer (PSK) reduced the power conversion efficiency (PCE) from 3% to 0.08% when one layer of C. TiO2 is deposited in the PSC and to 0.11% with two layers of C. TiO2. Power conversion efficiency, with CuI as the hole transport layer (HTL), showed an increase from 0.5% to 2.7% when Au layer was deposited between PSK and CuI layers. Also, Isc increased from 6.8 mA to 17.4 mA and Voc from 0.3 V to 0.5V. With depositing Au layer between P3HT and PSK layers, the results showed an increase in the efficiency from 1% to 2.6% and an increase in Isc from 10.7 mA to 30.5 mA, while Voc decreased from 0.75 V to 0.5V
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreThis research focuses on the difficulties that face Oud's students' in the performance of Sharif Muheyddin Haider musical works. In addition, this research suggests solutions to overcome these difficulties for make it easier to play Haider's musical works. This research also addressed important topics of great relevance the title, problem and the research's aims. Moreover, Procedures of this research adopted the descriptive approach (content analysis) to attain the research's aims. Furthermore, results and discussions where covered, and conclusions of the appropriate academic solutions were achieved to overcome the performance difficulties of Haider's musical works among Oud's students'. At the end, the research presents a set of recomme
... Show Moreاعداد : أسرار عبد الزهراء علي - علاء الدين - ب. جواد حسن عودة عبد الله - جامعة بغداد جامعة بغداد كلية البصرة للعلوم والتكنولوجيا - كلية الإدارة والاقتصاد. كلية الإدارة والاقتصاد المركز الديمقراطي العربي – مجلة القانون الدستوري والعلوم الإدارية : العدد التاسع شباط – فبراير 2021 المجلد 3 ،
Human beings are starting to benefit from the technology revolution that witness in our time. Where most researchers are trying to apply modern sciences in different areas of life to catch up on the benefits of these technologies. The field of artificial intelligence is one of the sciences that simulate the human mind, and its applications have invaded human life. The sports field is one of the areas that artificial intelligence has been introduced. In this paper, artificial intelligence technology Fast-DTW (Fast-Dynamic Time Warping) algorithm was used to assess the skill performance of some karate skills. The results were shown that the percentage of improvement in the skill performance of Mai Geri is 100%.
Recently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreMany studies have been published to address the growing issues in wireless communication systems. Space-Time Block Coding (STBC) is an effective and practical MIMO-OFDM application that can address such issues. It is a powerful tool for increasing wireless performance by coding data symbols and transmitting diversity using several antennas. The most significant challenge is to recover the transmitted signal through a time-varying multipath fading channel and obtain a precise channel estimation to recover the transmitted information symbols. This work considers different pilot patterns for channel estimation and equalization in MIMO-OFDM systems. The pilot patterns fall under two general types: comb and block types, with
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreThe sensors based on Nickel oxide doped chromic oxide (NiO: Cr2O3) nanoparticals were fabricated using thick-film screen printing of sol-gel grown powders. The structural, morphological investigations were carried out using XRD, AFM, and FESEM. Furthermore, the gas responsivity were evaluated towards the NH3 and NO2 gas. The NiO0.10: Cr2O3 nanoparticles exhibited excellent response of 95 % at 100oC and better selectivity towards NH3 with low response and recovery time as compared to pure Cr2O3 and can stand as reliable sensor element for NH3 sensor related applications.
The Sliding Mode Control (SMC) has been among powerful control techniques increasingly. Much attention is paid to both theoretical and practical aspects of disciplines due to their distinctive characteristics such as insensitivity to bounded matched uncertainties, reduction of the order of sliding equations of motion, decoupling mechanical systems design. In the current study, two-link robot performance in the Classical SMC is enhanced via Adaptive Sliding Mode Controller (ASMC) despite uncertainty, external disturbance, and coulomb friction. The key idea is abstracted as follows: switching gains are depressed to the low allowable values, resulting in decreased chattering motion and control's efforts of the two-link robo
... Show More