Theoretical calculation of the electronic current at N 3 contact with TiO 2 solar cell devices ARTICLES YOU MAY BE INTERESTED IN Theoretical studies of electronic transition characteristics of senstizer molecule dye N3-SnO 2 semiconductor interface AIP Conference. Available from: https://www.researchgate.net/publication/362813854_Theoretical_calculation_of_the_electronic_current_at_N_3_contact_with_TiO_2_solar_cell_devices_ARTICLES_YOU_MAY_BE_INTERESTED_IN_Theoretical_studies_of_electronic_transition_characteristics_of_senstiz [accessed May 01 2023].
Background: The aim of this national oral health survey was to determine the prevalence of malocclusions due to some anomalies in the dentition among the 13 years old Kurdish students in sulaimani intermediate school. Materials and methods: The total sample was 950 (455 males and 495 females) which assessed by diagnostic set and special instrument. The clinical examination was mainly based on the definitions of Björk et al. Some variables were recorded as present or absent sometimes denoting the tooth or the teeth involved in malocclusion and their distribution according to the whole sample. Results: The results showed that 1)The most common extracted tooth was the mandibular first molar (2.9%). 2) At this age group the most common partial
... Show MoreRecently, it has been revealed that Toxoplasmosis may be associated with some factors related to type 2 diabetes, such as glucose, insulin, the Homeostatic Model Assessment for Insulin Resistant (HOMA-IR), and Fatty acid binding protein (FABP). Therefore, the current study aimed to specify how Toxoplasma gondii (T.gondii) infection affects glucose, insulin, HOMA-IR, and FABP among adolescents. From October to December 2022, this study was carried out at Al Madain Hospital in Baghdad. For a group of adolescents visiting the hospital, an ELISA test was performed to check their anti-T.gondii antibodies. Ninety adolescents were selected to participate in the study on the basis of this examination. They were divided into two groups: those who te
... Show MoreIn this paper, we proved that if R is a prime ring, U be a nonzero Lie ideal of R , d be a nonzero (?,?)-derivation of R. Then if Ua?Z(R) (or aU?Z(R)) for a?R, then either or U is commutative Also, we assumed that Uis a ring to prove that: (i) If Ua?Z(R) (or aU?Z(R)) for a?R, then either a=0 or U is commutative. (ii) If ad(U)=0 (or d(U)a=0) for a?R, then either a=0 or U is commutative. (iii) If d is a homomorphism on U such that ad(U) ?Z(R)(or d(U)a?Z(R), then a=0 or U is commutative.
In this research PbS and PbS:Cu films were prepered with thicknesses (0.85±0.05)?m and (0.55±0.5)?m deposit on glass and silicon substrate respectively using chemical spray pyrolysis technique with a substrate temperature 573K, from lead nitrate salt, thiourea and copper chloride. Using XRD we study the structure properties for the undoped and doped films with copper .The analysis reveals that the structure of films were cubic polycrystalline FCC with a preferred orientation along (200) plane for the undoped films and 1% doping with copper but the orientation of (111) plane is preferred with 5% doping with the rest new peaks of films and appeared because of doping. Surface topography using optical microscope were be checked, it was found
... Show MoreOffline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show More