The objective of this research is to study the possibility of reducing the reflectivity of the front surface of a silicon cell (Si / Si) by using a theoretical design for a single-layer Antireflection Coatings with a thickness of one quarter of the design wavelength. Then, Mathematical programs in MATLAB (10) were designed to study the quantitative efficiency of the cell as a function of the change in the particle size of the coating within the range (400 - 700 nm) wavelength of the visible state of the vertical and oblique state at the (45°) angle. (Ge) was used as an anti-reflective material. It was found that the highest quantitative efficiency was (96.9004%) at design wavelength (λ0= 550 nm) in the case of vertical fall. Whereas, in the case of a sloping fall at an angle of (45o), a quantitative efficiency of (94.0545%) at vertical polarization (S). In the case of horizontal polarization (P), the quantitative efficiency value is (96.3131%) when the particle size of the coating is (Ps = 4.4nm).
Reliable data transfer and energy efficiency are the essential considerations for network performance in resource-constrained underwater environments. One of the efficient approaches for data routing in underwater wireless sensor networks (UWSNs) is clustering, in which the data packets are transferred from sensor nodes to the cluster head (CH). Data packets are then forwarded to a sink node in a single or multiple hops manners, which can possibly increase energy depletion of the CH as compared to other nodes. While several mechanisms have been proposed for cluster formation and CH selection to ensure efficient delivery of data packets, less attention has been given to massive data co
In this paper, we have investigated some of the most recent energy efficient routing protocols for wireless body area networks. This technology has seen advancements in recent times where wireless sensors are injected in the human body to sense and measure body parameters like temperature, heartbeat and glucose level. These tiny wireless sensors gather body data information and send it over a wireless network to the base station. The data measurements are examined by the doctor or physician and the suitable cure is suggested. The whole communication is done through routing protocols in a network environment. Routing protocol consumes energy while helping non-stop communic
... Show MoreCoumarins have been recognized as anticancer competitors. HDACis are one of the interesting issues in the field of antitumor research. In order to achieve an increased anticancer efficacy, a series of hybrid compounds bearing coumarin scaffolds have been designed and synthesized as novel HDACis, In this review we present a series of novel HDAC inhibitors comprising coumarin as a core e of cap group of HDAC inhibitors that have been designed, synthesized and assessed for their enzyme inhibitory activity as well as antiproliferative activity. Most of them exhibited potent HDAC inhibitory activity and significant cytotoxicity
Introduction: Cutaneous leishmaniasis (CL) is a common protozoan disease in Iraq characterized by localized ulcers, primarily on exposed skin. This study aimed to investigate the hematological parameters of infected patients using a complete blood count (CBC) in the endemic area of Diyala Governorate, northeast of Baghdad. This has been studied in newly diagnosed, untreated individuals and patients receiving sodium antimony gluconate. Methodology: Hematological screening was performed on blood samples from 161 patients with microscopically diagnosed cutaneous leishmaniasis before and after treatment. Anti-Leishmania IgG was also assessed by ELISA in seropositive and seronegative subjects. Results: The newly diagnosed, untreated pati
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis paper is concerned with the solution of the nanoscale structures consisting of the with an effective mass envelope function theory, the electronic states of the quantum ring are studied. In calculations, the effects due to the different effective masses of electrons in and out the rings are included. The energy levels of the electron are calculated in the different shapes of rings, i.e., that the inner radius of rings sensitively change the electronic states. The energy levels of the electron are not sensitively dependent on the outer radius for large rings. The structures of quantum rings are studied by the one electronic band Hamiltonian effective mass approximati
... Show MoreAs we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreConstructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves
هدٌفت الد ا رسة إل هعرفة تأثير الهستخمص الزيتي لىبات الدارسين
Cinnamomum zeylanicum عم بعض الجكاىب الفسمجية كالىس جية في الفئ ا رف الهخهجة بالأكياس العذرية أك الطكر اليرقي لمهشككة
الحبيبية Echinococcus granulosus .كتقيي كفاءة الهستخمص الزيتي لىبات الدارسيف ضد الإصابة
التجريبية بالأكياس الهائية العذرية. استخد 40 فأ ا ر قسهت إل أربع هجاهيع هتساكية .حقىت الفئ ا رف في
الهجكعة الأكل كالثاىية كالثالثة ب 2000 رؤيس أكلي / فأر ،
Hepatitis A virus infection occurs globally and is causing a public health
concern, primarily in developing countries due to its persistent circulation in the
environment. A total of 120 individuals were included in this study, anti-HAV IgM
antibodies were detected in serum of 100 individuals of them (patients group) who
attended the Wasit central public health laboratory from different cities in Wasit
Province, Iraq, during the period from November 2013 to March 2014.While
another 20 individuals were considered as control group which anti – HAV IgM
antibody was negative in their serum.
Acute infection is confirmed by detection of IgM anti–hepatitis A virus (HAV),
which appears early in the course of infect