This article reviews the construction of organic solar cell (OSC) and characterized their optical and electrical properties, where indium tin oxide (ITO) used as a transparent electrode, “Poly (3-hexylthiophene- 2,5-diyl) P3HT / Poly (9,9-dioctylfluorene-alt-benzothiadiazole) F8BT” as an active layer and “Poly(3,4-ethylenedioxythiophene)-poly (styrene sulfonate)” PEDOT: PSS which is referred to the hole transport layer. Spin coating technique was used to prepared polymers thin film layers under ambient atmosphere to make OSC. The prepared samples were characterized after annealing process at (80 ͦ C) for (30 min) under non-isolated circumference. The results show a value of filling factor (FF) of (2.888), (0.233) and (0.28) and power conversion efficiency (PCE) of (0.0055), (3.333 10-6) and (0.0004), where these results were obtained by Keithley Electrometer Model 6517B, while spectral response is being utilized by LEOI-94 Monochromator and Keithley 6517B Electrometer.
The study aimed to investigate the effect of different times as follows 0.5, 1.00, 2.00 and 3.00 hrs, type of solvent (acetone, methanol and ethanol) and temperature (~ 25 and 50)ºc on curcumin percentage yield from turmeric rhizomes. The results showed significant differences (p? 0.05) in all variables. The curcumin content which were determined spectrophotometrically ranged between (0.55-2.90) %. The maximum yield was obtained when temperature, time and solvent were 50ºC, 3 hrs and acetone, respectively.
While conservative access preparations could increase fracture resistance of endodontically treated teeth, it may influence the shape of the prepared root canal. The aim of this study was to compare the prepared canal transportation and centering ability after continuous rotation or reciprocation instrumentation in teeth accessed through traditional or conservative endodontic cavities by using cone-beam computed tomography (CBCT).
Forty extracted intact, matured, and 2-rooted human maxillary first premolars were selected for this
An essential issue in obstetrics is the prevalence of maternal and fetal complications in pregnant women with polycystic ovary syndrome (PCOS). The purpose of the present study was to investigate the prevalence of pregnancy complications among various phenotypes of pregnant women with PCOS.
Bipedal robotic mechanisms are unstable due to the unilateral contact passive joint between the sole and the ground. Hierarchical control layers are crucial for creating walking patterns, stabilizing locomotion, and ensuring correct angular trajectories for bipedal joints due to the system’s various degrees of freedom. This work provides a hierarchical control scheme for a bipedal robot that focuses on balance (stabilization) and low-level tracking control while considering flexible joints. The stabilization control method uses the Newton–Euler formulation to establish a mathematical relationship between the zero-moment point (ZMP) and the center of mass (COM), resulting in highly nonlinear and coupled dynamic equations. Adaptiv
... Show MoreBackground: In Iraqi communities, the workers considered the largest population groups, so increasing their dental education by increasing the care for their dental health knowledge and behavior is very important, the present study was aimed to evaluate the gingival health and oral hygiene in relation to knowledge and behavior among a group of a workers selected randomly from Al Fedaa company in Baghdad city. Materials and methods: A sample of 110 workers (65 men and 45 women) included in this study, a questionnaire used to evaluate their oral health knowledge and behavior. The gingival health condition of the workers was examined by using Loe and Silness index (1963), Silness and Loe index (1964) was used to asses plaque quantity, and Ramf
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreBackground: Pulpotomy is an accepted treatment for the management of cariously exposed pulps in symptom free primary molars to achieve one of the most important goals for Pedodontists, which is the retention of the pulpally involved deciduous teeth healthy until the time of normal exfoliation. The purpose of this study was to evaluate the relative success of pulpotec, formocresol and Mineral Trioxide Aggregate (MTA) in cariously exposed primary molar teeth, using clinical and radiographical examinations. Materials and methods: Thirty nine children with 45 primary molars requiring pulpotomy were selected in this study, 15 teeth treated by each type of pulpotomy medicament. Clinical and radiographical follow up for the patients was performed
... Show More