Solar energy has significant advantages compared to conventional sources such as coal and natural gas, including no emissions, no need for fuel, and the potential for installation in a wide range of locations with access to sunlight. In this investigation, heterocyclic derivatives were synthesized from several porphyrin derivatives (4,4',4",4"'-(porphyrin-5,10,15,20-tetrayl) tetra benzoic acid) compound (3), obtained by reaction Pyrrole with 4-formyl benzoic acid. Subsequently, porphyrin derivative-component amides 5a, 5b, and 5c were produced by reacting compound (3) with amine derivatives at a 1:4 molar ratio. These derivatives exhibited varying sensitivities for utilization in solar cells, with compound 5a displaying the highest power conversion efficiency (PCE) at 1.37%, as determined by measuring the short circuit current (Jsc), open-circuit voltage (Voc), and fill factor (FF) (Jsc = 2.24 mA cm-2, Voc = 0.80 mV, FF = 76.5%). Meanwhile, compound 5c exhibited the lowest PCE at 0.94% (Jsc = 1.55 mA cm-2, Voc = 0.750 mV, FF = 76.4%).
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA monthly correlation between urban vegetation growth and potential evapotranspiration (PET) is needed for better knowledge of controlling water resources and organized irrigation processes. This study aims to explore their relationship within an urban area like Baghdad, using a linear regression model to derive a best-fit line drawn in a scatterplot on a monthly time scale. Based on two different monthly data sources: weather variables (e.g., air temperature, solar radiation, and relative humidity) and Sentinel-2 satellite imagery of 2 years, 2018 and 2021, this study presented the interannual variations of PET and normalized difference vegetation index (NDVI). The choice of these ye
The study highlighted the transformation of value systems and educational patterns between past and present, especially with the introduction of modern variables and means, such as mobile phones, the internet, social media, and others. These factors have contributed both positively and negatively to the study. The study highlights the integral role of the school in collaboration with the family in guiding and educating children. It also emphasizes the active role of the school in developing students' abilities and skills, either attracting them to school or vice versa. This includes an examination of the essential skills required in education and their role in achieving a state of psychological well-being and systematically developing child
... Show MoreThe aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i
... Show MoreBackground: Diabetes is a metabolic disorder characterized by chronic hyperglycemia due to an inability to produce insulin. Uncontrolled or poorly controlled diabetes is clinically associated with increased susceptibility to delay healing. Many recent researches have shown that stem cell therapy can be the best choice for treatment of this disease. The aims of this research were investigating regeneration of pancreatic beta cells of diabetic induced rabbits after stem cell transplantation. Materials and Methods: 64 rabbits weighting an average of (2.5 - 3 kg) were used in this experimental study, and divided into 4 groups as follows; group A ( contains 16 healthy rabbits regarded as control group ) , Group B ( contains 16 diabetic rabbits
... Show MoreThe research aims to identify the administrative skills and their role in institutional performance, and used the descriptive approach in a survey style and correlational relations to suit the nature of the problem to be studied.The research community was identified with the directors of sports activity in the Iraqi universities in a deliberate manner, and their number is (134) directors, where two scales (administrative skills and institutional performance) were used and the two scales were distributed to the above-mentioned sample in order to obtain answers that meet the required and representative sample of the community on the day 3/12/2021. The answers to all the statements were completed and after processing the results statistically
... Show MoreThe reaction of some new Schiff bases ( 2-[(2-Amino – ethylimino)-methyl]-R , 2-({2-[(R-benzylidene)-amino]-ethylimino}-methyl)-R with Benzoyl chloride or Acetyl chloride were carried out. Subsequent reactions of these products N-(2-Amino-ethyl)-N-[Chloro-(R) –methyl]-benzamide or N-(2-{?-[chloro-(R) –methyl]-amino}-ethyl)-N-[chloro-(R) –methyl]- benzamide with thiourea afforded thioureas compounds. The synthesized compounds were confirmed by their IR,UV,spectra and C.H.N. analysis.
Worldwide attention is being focused on nanocrystalline zeolites and they are replacing conventional ones due to their pronounced potential in many fields. In this study, NaY zeolite has been prepared hydrothermally using sol –gel method and modified to the proton type by ion –exchange process. Characterization is made using X-ray diffraction (XRD), thermogravimetric analysis (TGA), Fourier transform infrared spectroscopy (FTIR), Atomic force microscopy (AFM), Brunauer –Emmet- Teller (BET) nitrogen adsorption method, Ammonia Temperature programmed desorption (NH3-TPD) and Scanning electron microscopy( SEM). The effect of aging time, silica to alumina ratio is studied and the results sh
... Show MoreThe reaction of(2-oxo-2H-chromen-3-Carbonyl chloride)(k1) with hydrazine in boiling ethanol gives the hydrazide(K2).When compound (k2) reacts with various aromatic aldehydes ,the corres ponding Schiff bases(k3–k4) achieve new series of thiazotidines (k5–k6) and azetidinones (k7–k8) obtained from the reactions of appropriate Schiff bases with mercapto acetic acid and chloro acetyl chloride respectively. All the compounds are characterized by FT-IR,1H-NMR and GC-Ms.