(3) (PDF) Theoretical investigation of charge transfer at N3 sensitized molecule dye contact with TiO2 and ZnO semiconductor. Available from: https://www.researchgate.net/publication/362773606_Theoretical_investigation_of_charge_transfer_at_N3_sensitized_molecule_dye_contact_with_TiO2_and_ZnO_semiconductor [accessed May 01 2023].
Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing
This paper deals with constructing a model of fuzzy linear programming with application on fuels product of Dura- refinery , which consist of seven products that have direct effect ondaily consumption . After Building the model which consist of objective function represents the selling prices ofthe products and fuzzy productions constraints and fuzzy demand constraints addition to production requirements constraints , we used program of ( WIN QSB ) to find the optimal solution
In previous our research, the concepts of visible submodules and fully visible modules were introduced, and then these two concepts were fuzzified to fuzzy visible submodules and fully fuzzy. The main goal of this paper is to study the relationships between fully fuzzy visible modules and some types of fuzzy modules such as semiprime, prime, quasi, divisible, F-regular, quasi injective, and duo fuzzy modules, where under certain conditions it has been proven that each fully fuzzy visible module is fuzzy duo. In addition, there are many various properties and important results obtained through this research, which have been illustrated. Also, fuzzy Artinian modules and fuzzy fully stable modules have been introduced, and we study the rel
... Show MoreRheumatoid arthritis (RA) is a common inflammatory disease that associated with increased morbidity and mortality due to accelerated atherosclerosis. Rosuvastatin is a unique hydroxy methyl glutaryl Co A (HMGCoA) reductase inhibitor that has anti inflammatory effects.
The aim of this study was to evaluate the effect of rosuvastatin as adjuvant therapy to methotrexate (MTX) on lipid profile and its possible cardioprotective effect in RA patients. A double blinded placebo controlled clinical trial with 8 weeks follow up periods at which 40 patients with active RA using MTX were randomized into 2 groups to receive either rosuvastatin 10mg or placebo as adjuvant therapy to MTX. In addition to twenty healthy subjects as control group.
... Show MoreBreast cancer is the commonest cause of cancer related death in women worldwide. Amplification or over-expression of the ERBB2 (HER/neu) gene occurs in approximately 15-30% of breast cancer cases and it is strongly associated with an increased disease recurrence and a poor prognosis. Determination of HER2/neu status is crucial in the treatment plan as that positive cases will respond to trastuzumab therapy. It has been used to test for HER2/neu by immunohistochemistry as a first step and then to study only the equivocal positive cases (score 2+) by in situ hybridization technique. The aim of our study is to compare between immunohistochemistry and silver in situ hybridization (SISH) in assessment of human epidermal growth factor (HER2/neu)
... Show MoreThe effect of 532nm Diode Pumped Solid State (DPSS) laser at power density of 5.234 W/cm2 on the growth of Gram-negative Pseudomonas aeruginosa and Gram-positive Staphylococcus aureus was evaluated. These bacteria were isolated from samples taken from burn and infected wound areas of 55 patients admitted to the burn-wound unit in Al-Kindy teaching hospital in Baghdad during the period from October 2012 to March 2013. Each isolate was identified using microscopic, cultural and biochemical methods. A standard bacterial suspension was prepared for each isolate. Serial dilutions were then prepared and a dilution of 10-5 was selected. Irradiation experiments included four groups: (L-P-) bacterial suspension in saline solution, (L-P+) bacteria
... Show MoreBackground: Diabetes mellitus is a major risk factor for chronic periodontitis (CP) and hyperglycemia has an important role in the enhancement of the severity of the periodontitis. It has been reported that the progression of CP causes shifting of the balance between bone formation and resorption toward osteoclastic resorption, and this will lead to the release of collagenous bone breakdown products into the local tissues and the systemic circulation. Cross-linked N-telopeptide of type I collagen (NTx) is the amino-terminal peptides of type I collagen which is released during the process of bone resorption. This study was conducted to determine the effects of nonsurgical periodontal therapy on serum level of NTx in type 2 diabetic patients
... Show MoreThe eaction of 2 4 .6-trihydroxyactophenonemonohydra1e with
l hydr.azine monohydrate was realized ti·nder reflu.(( in methanol and i:l.
Jew drops of glacial acetic acid we.re added to give lhe'(int rmediate)
2-(1hydr pno-ctbyt)-benzcne-·1.3.5-r:Qql, which reacted wittl
saEcy.laldehyde. jn methm)ql to gjy;e 'a new :tyRe CNzOi) Ligand (H:flL]
f(2-{1-[(2-=bydroxy-bertzylide·ne)-bydrazqoo,J-e·thy.1}bcnze·neJ ;3·,5
|
Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More