CdS Nps (inorganic material) was prepared by the chemical reaction method. ZnPc (organic material) and CdS thin films were prepared separately to compare their characterization with the hybrid BHJ blend ZnPc/CdS thin film (2ml:2ml) by spin coating technique. The structural and morphological properties of the prepared thin films have been measured by XRD and AFM respectively. The XRD pattern for both as-deposited and annealed CdS nanoparticle films shows a hexagonal structure. The crystallite size behavior of as deposited ZnPc films and annealing at 423K for 1h, 2h and 3h was approximately similar to the behavior of heat treated blended films. The grain size was measured by AFM, which decreaseds with annealing temperature for ZnPc films, while it increases with annealing for CdS films.
Luminescent solar concentrator (LSC) are used to enhance photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%. this improvement is referred to the widening of the response spectral region window of the a- Si. Solar cell.
This work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc
... Show More. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a
... Show MoreThe present study aimed to investigate the morphological description and histological structure of Gallbladder in the adult local chicken bird. The morphological description and histological structure of the Gallbladder in the local chicken Gallus gallus domesticus found in the form of a cystic, spindle or pear-shaped, dark green color, located within the visceral abdominal side of the right lobe of the liver, histologically it was found that its wall consisted of three tunicae. The first tunica is mucosa which consists of an epithelial lining layer and lamina propria layer, while the muscularis mucosa was missing. The second tunica is musclaris, which is composed of smooth circularly arranged muscle fibers, and the third tunica is serosa o
... Show MoreThe objective of this study was to investigate the morphological description and histological structure of adrenal gland in Iraqi black partridge Francolinus francolinus from Iraqi environment. Twenty adult healthy birds (male and female) were used in present study. They were measured and adrenal glands were removed, measured and fixed by 10% formalin and formalin and chromate fixative then stained with rotein histochemical stain (Harris hematoxylin and eosin stain (H&E), periodic acid Schiff (PAS), Azan and Mallory stain). The partridge had a small couple of adrenal glands of yellow colour they are located in abdominal cavity nearby the margin of superior kidney lobe. These are small, ovoid glands lying just cranial to the kidneys a
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreTo investigate the effect of chemical mutagens: sodium azide (SA), hydrazine hydrate (HZ) and maleic hydrazine (MH) on morphological variations of faba bean traits. Seeds were soaked in distilled water for six hours, then in different concentrations of the above mentioned mutagens (0.01, 0.03, 0.05%) represented by (C1,C2 and C3 respectively) for six hours and planted in the field in winter 2013-2014. Factorial Experiment was arranged in Randomized Complete Block Design (RCBD) with three replications to each treatment. The results of statistical analysis showed significant differences among studied treatments. All mutagens showed significant reduction in plan height and number of branches per plant compared with control plants which gave
... Show More