Within this work, to promote the efficiency of organic-based solar cells, a series of novel A-π-D type small molecules were scrutinised. The acceptors which we designed had a moiety of N, N-dimethylaniline as the donor and catechol moiety as the acceptor linked through various conjugated π-linkers. We performed DFT (B3LYP) as well as TD-DFT (CAM-B3LYP) computations using 6-31G (d,p) for scrutinising the impact of various π-linkers upon optoelectronic characteristics, stability, and rate of charge transport. In comparison with the reference molecule, various π-linkers led to a smaller HOMO–LUMO energy gap. Compared to the reference molecule, there was a considerable red shift in the molecules under study (A1–A4). Therefore, based on the analysis of energy level, A4 and A3 were shown to be promising non-fullerene acceptors with the designed donors for applications in solar cells. It is hoped that the current study would provide theoretical insights into the design and amplification of optoelectronic characteristics of suggested frameworks on a grand scale in comparison with the reference molecules.
Background: The world is in front of two emerging problems being scarceness of virgin re-sources for bioactive materials and the gathering of waste production. Employment of the surplus waste in the mainstream production can resolve these problems. The current study aimed to prepare and characterize a natural composite CaO-SiO2 based bioactive material derived from naturally sustained raw materials. Then deposit this innovative novel bioactive coating composite materials overlying Yttria-stabilized tetragonal zirconia substrate. Mate-rials and method; Hen eggshell-derived calcium carbonate and rice husk-derived silica were extracted from natural resources to prepare the composite coating material. The manufac-tured powder was characterized
... Show MoreThe existence of the Internet, networking, and cloud computing support a wide range of new technologies. Blockchain is one of these technologies; this increases the interest of researchers who are concerned with providing a safe environment for the circulation of important information via the Internet. Maintaining solidity and integrity of a blockchain’s transactions is an important issue, which must always be borne in mind. Transactions in blockchain are based on use of public and private keys asymmetric cryptography. This work proposes usage of users’ DNA as a supporting technology for storing and recovering their keys in case those keys are lost — as an effective bio-cryptographic recovery method. The RSA private key is
... Show MoreThis paper proposes feedback linearization control (FBLC) based on function approximation technique (FAT) to regulate the vibrational motion of a smart thin plate considering the effect of axial stretching. The FBLC includes designing a nonlinear control law for the stabilization of the target dynamic system while the closedloop dynamics are linear with ensured stability. The objective of the FAT is to estimate the cubic nonlinear restoring force vector using the linear parameterization of weighting and orthogonal basis function matrices. Orthogonal Chebyshev polynomials are used as strong approximators for adaptive schemes. The proposed control architecture is applied to a thin plate with a large deflection that stimulates the axial loadin
... Show MoreThe wide spread of Computer Based Test in the Iraqi universities raised an important concern for some scholars thinking about integrating computers as an academic assessment tool before making big change in the examination systems, that concern is: how the computerized test score is effected in comparison to old paper and pencil . This paper researches whether test scores of Iraqi students varies in the computer, Pencil based tests, sixty-four postgraduate graduates from Iraqi universities. Thirty five female and twenty nine male, all graduated from colleges of science in specializations other than computer science and applying for postgraduate studies in the Iraqi
... Show MoreBefore users store data in the cloud, many security issues must be addressed, as they will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.). This article proposes a system based on chaotic maps for private key generation. A hybrid encryption for fast and secure cryptography. In addition to a multi-cloud storage with Pseudonymized file names to preserve user data privacy on the cloud while minimizing data loss. As well as a hash approach to check data integrity. AES in combination with RSA and fragmenting the file is used for the encryption. Integrity is cheeked using SHA-3. The experiments demonstrated that the key generation stra
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreEngineering project assessment at Al-Muthana Airport in Baghdad, Iraq, has been studied using a 3D electrical resistivity imaging survey. The site investigation is crucial for assessing the future of the region's infrastructures since it reveals the location of buried facilities or weak zones below the surface and measures localized groundwater levels. Wenner-Schlumberger array was used to conduct four parallel 2D electrical resistivity spreads (MU1 to MU4). Each spread line was 100 m in length with 1 m electrode spacing and an average spacing of 9 meters between any two adjacent lines. The depth of the investigation was around 23.8 m. Survey lines were drawn going from northwest to southeast. These spreads were combined to prov
... Show More