Preferred Language
Articles
/
ijp-99
Solar cells based on natural dyes prepared using anatase phase titanium dioxide
...Show More Authors

Natural dye sensitized solar cell was prepared using strawberry and pomegranate dyes with anatase nanocrystalline titanium dioxide powder. A study of the optical properties of the two dyes, involving the absorption spectrum was determined in the visible region. I-V characteristics under illumination were performed. The results showed that the two prepared dye sensitized solar cells have acceptable values efficiency about (0.94 with Fill factor (45)) and (0.74 with Fill factor (44)) for strawberry and pomegranate dyes, respectively.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 01 2004
Journal Name
Pmj-iraqi Postgraduate Medical Journal
The role of circulating phagocytic cells in muscle regeneration
...Show More Authors

Results: it was found that labelled cells participated in the formation of myotubes, which formed mature muscle fibers, and possibly new satellite cells. The results of this experiment may eventually revolutionized therapeutic procedures for some form of muscle diseases

Publication Date
Tue Apr 21 2020
Journal Name
University Of Thi-qar Journal Of Science (university Of Thi-qar Journal Of Science (utsci) The 4th Scientific Conference Of Science College/ University Of Thi_qari) The 4th Scientific Conference Of Science College/ University Of Thi_qar
Enhancement of Nano Catalyst for an Alkaline Fuel Cells
...Show More Authors

Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Hydrogen Energy
Improvement of bioenergy generation using innovative application of food waste materials for coating carbon nanotubes-loaded bioanode in 3D-microbial fuel cells
...Show More Authors

View Publication
Crossref (9)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Materials Science Forum
Study the Effect of Liquid Layer Level on the Formation of Zinc Oxide Nanoparticles Synthesized by Liquid-Phase Pulsed Laser Ablation
...Show More Authors

This work is focused on studying the effect of liquid layer level (height above a target material) on zinc oxide nanoparticles (ZnO and ZnO2) production using liquid-phase pulsed laser ablation (LP-PLA) technique. A plate of Zn metal inside different heights of an aqueous environment of cetyl trimethyl ammonium bromide (CTAB) with molarity (10-3 M) was irradiated with femtosecond pulses. The effect of liquid layer height on the optical properties and structure of ZnO was studied and characterized through UV-visible absorption test at three peaks at 213 nm, 216 nm and 218 nm for three liquid heights 4, 6 and 8 mm respectively. The obtained results of UV–visible spectra test show a blue shift accomp

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Computational Analysis of Turbulent Natural Convection in Water Filled Tall Enclosure
...Show More Authors

In this study, the turbulent buoyancy driven fluid flow and heat transfer in a differentially heated rectangular enclosure filled with water is quantified numerically. The two dimensional governing differential equations are discretized using the finite volume method. SIMPLE algorithm is employed to obtain stabilized solution for high Rayleigh numbers by a computational code written in FORTRAN language. A parametric study is undertaken and the effect of Rayleigh numbers (1010 to 1014), the aspect ratio (30, 40 and 50), and the tilt angle (10o to 170o ) on fluid flow and heat transfer are investigated. The results of the adopted model in the present work is compared with previously published results and a qualitative agreement and a good

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 12 2015
Journal Name
International Journal Of Humanities, Arts, Medicine And Sciences
SYNTHESIS, SPECTRAL, DYEING PERFORMANCE AND BIOLOGICAL ACTIVITY STUDIES OF AZO DYES COMPLEXES WITH SOME METAL IONS
...Show More Authors

Some azo compounds were prepared by coupling the diazonium salts of amines with 2,4-dimethylphenol The structure of azo compounds were determined on the basis of elemental analyses, 1HNMR, FT-IR and UV-Vis spectroscopic techniques. Complexes of nickel(II) and copper(II) have been synthesized and characterized. The composition of complexes has been established by using flame atomic absorption, (C.H.N) Analysis, FT-IR and UV-Vis spectroscopic methods as well as conductivity magnetic susceptibility measurements. The nature of the complexes formed were studied following the mole ratio and continuous variation methods, Beer's law obeyed over a concentration range (1×10-4 - 3×10-4 M). High molar absorbtivity of the complex solutions were observ

... Show More
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF