Within this work, to promote the efficiency of organic-based solar cells, a series of novel A-π-D type small molecules were scrutinised. The acceptors which we designed had a moiety of N, N-dimethylaniline as the donor and catechol moiety as the acceptor linked through various conjugated π-linkers. We performed DFT (B3LYP) as well as TD-DFT (CAM-B3LYP) computations using 6-31G (d,p) for scrutinising the impact of various π-linkers upon optoelectronic characteristics, stability, and rate of charge transport. In comparison with the reference molecule, various π-linkers led to a smaller HOMO–LUMO energy gap. Compared to the reference molecule, there was a considerable red shift in the molecules under study (A1–A4). Therefore, based on the analysis of energy level, A4 and A3 were shown to be promising non-fullerene acceptors with the designed donors for applications in solar cells. It is hoped that the current study would provide theoretical insights into the design and amplification of optoelectronic characteristics of suggested frameworks on a grand scale in comparison with the reference molecules.
An optical spectroscopic study is reported in this article to study the correlation between the supermassive black hole (SMBH) and the star formation rate (SFR) for a sample of Seyfert galaxies type (I and II). The study focused on 45 galaxy of Seyfert 1, in addition to 45 galaxy of Seyfert 2, where these samples have been selected form different survey of Salon Digital Sky Survey (SDSS). The redshift (z) of these objects were between (0.02 – 0.26). The results of Seyfert 1 galaxies shows that there good correlation between the SMBH and the SFR depending on statistical analysis parameter named Spearman’s Rank Correlation in a factor of (ρ=0.609), as well as the Seyfert 2 galaxies results show a good correlation between the SMBH
... Show MoreDiabetic kidney disease (DKD) is caused by a variety of processes. As a result, one biomarker is insufficient to represent the complete process. This study Evaluate the diagnostic value of serum kidney injury molecule-1(KIM-1) and cystatin C (CysC) as early biochemical markers of DKD and predictive their sensitivities and specificities as biomarkers of nephropathy in Iraqi type 2 diabetic (T2DM) patients. This cross-sectional study include 161 T2DM patients from Diabetes and Endocrinology Center at Merjan medical city in Babylon. Patients divided according to urinary albumin creatinine ratio(ACR) (Group1:ACR≤30mg/g,Group2:ACR>30mg/g). Random spot urine and fasting blood samples were taken from each patient and urinary ACR, bloo
... Show MoreIn this work, we will combine the Laplace transform method with the Adomian decomposition method and modified Adomian decomposition method for semi-analytic treatments of the nonlinear integro-fractional differential equations of the Volterra-Hammerstein type with difference kernel and such a problem which the kernel has a first order simple degenerate kind which the higher-multi fractional derivative is described in the Caputo sense. In these methods, the solution of a functional equation is considered as the sum of infinite series of components after applying the inverse of Laplace transformation usually converging to the solution, where a closed form solution is not obtainable, a truncated number of terms is usually used for numerical
... Show MoreAcute appendicitis is one of the commonest causes of acute abdomen. There is a wide discussion and controversy on the surgical and nonsurgical treatment of acute uncomplicated appendicitis. The aim of this study was to evaluate the efficacy and outcomes of the conservative management of selected cases of acute appendicitis with an antibiotic first plan.
This was a single hospital-based prospective study with a durat
The load shedding scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po
... Show MoreFuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreThis paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re
... Show MoreBecause of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More