In this paper, Cu2S/CdS solar cells were prepared with different thickness of CdS layer, these layers were prepared by using chemical spray pyrolysis technique. The chemical spray solution was prepared by mixing cadmium chloride CdCl2 and thiourea CS(NH2)2 of molar concentration 0.1 M/L, the CdS layer was formed after the solution was sprayed on hot Aluminum substrate at temperature 400°C. Experimentally the type of CdS film was found as n–type depending on the results of Hall Effect, the value of the Hall factor (RH) is about – 1.348 x 10–6 m3/C and the density of the majority charge carriers (N) is about 4.64x1018 cm–3. The prepared film was tested by using X-Ray diffraction; the result shows that the film was CdS with a polycrystalline structure. The Cu2S layer was prepared by using Chemical dip process; this layer was formed on the surface of the CdS film and it is always p-type. The heat treatment was utilized to form the p–n junction. The current-voltage characteristics of p-Cu2S\n-CdS solar cells was studied, the efficiency of the prepared cells of different thickness; (2.19, 2.52, 3.64, and 5.55) μm of CdS layer was calculated at 85.4 mW/cm2 light intensities, the results show that the thickness of the polycrystalline CdS film is an important parameter affecting the cell efficiency.
Methotrxate (MTX) has become the standard of care and first-line therapy for patients who have RA and consider as a gold standard of treatment for RA. The role of MTX in the treatment of RA has now been well established. The use of MTX treatment of RA inhibits proliferation of the lymphocytes, reduces signs and symptoms this disease, reduces progression damage of the joints and improves quality of life outcome. Progranulin (PGRN) acts a role in autoimmune inflammatory, has important function in several processes including immune response. Present study has conducted to find the effect of MTX drugs as a therapeutic target for RA patients because of its ability to bind with tumor necrosis factor receptor (TNFR), with progranulin, obestatin an
... Show MoreAbstract
The aim of the present research is to identify the test wisdom and the preoccupation with learning and psychological tension among postgraduate students at the University of Samarra according to the variables of the department, gender, age, and employee or non-employee, and revealing the relationship between the test wisdom and the preoccupation with learning and psychological tension. The research sample consisted of (75) students randomly selected from postgraduate students at the college of Education. The researcher applies test –wisdom of (Mellman & Ebel) and measurement of preoccupation with learning prepared by (Al-zaabi 2013) also, the researcher used the scale of t
... Show MoreABSTRACT
Metal (II) complexes of Co, Ni, Cu and Zn with cefdinir C14H13N5O5S2 derivative (L) were synthesized and identification by elemental analysis CHNS Uv-Vis, FTIR, TGA, metal analysis AA, magnetic susceptibility and conduct metric measurement. by analysis the ligand behaves as a bidentate. For the cobalt complex, Tetrahedral geometry shape was suggested, while other complexes that have nickel, copper and zinc ions were proposed as octahedral geometry shape. The experimental method was studied for prevention of corrosion carbon steel in 3.5% NaCl by using a novel Cefdinir derivations drugs. The results showed that metal complex was a strong corro
... Show MorePurpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.
Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th
... Show MoreThe psychological pollution term comes from the realism that we live in its world. This
realism threatens our privet and the identity of our civilization. There is complete believe that
the literature of psychological pollution is insufficient to cover the whole horizons of this
term.
The psychological pollution has its root in the theories of the development of humanities
within the organization of the history. Some of these theories are the exceptional cultural
theory, the faithfulness theory and the integration theory and the identity losing.
The psychological pollution handles several concepts such as the engagement, the social
decay and the concept of cultural invasion.
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad, and upon God
The evil of the scholars of jurisprudence is that the reciter and the reciter must have attained the aspects of good grammar and morphology so that he does not make mistakes in the matters of jurisprudence according to the seven readers and others, and they require phonetic, morphological, and grammatical explanations, and this is called aqeed.
Our ancient scholars are known for knowledge and it is linked to narration, and our topic is studied from both sides of narration and knowledge, as it is one of the topics of fundamentals.
The seven readers and others, and his relationship is clear and close
... Show MoreWhat distinguishes the athlete in dealing with all stimuli is the ability to understand the cognitive rules through which he acts and directs behavior through thinking and regular planning methods in dealing with the environment in a realistic manner, and this comes through techniques and means based on modernity in obtaining information that makes the athlete arrange in His memory is the programs that are the most important crutch for relying on when he asks for them in applying and executing the skill assignment. One of the enhancers of awareness of variables is the ability of coaches to provide openness in modern ideas to find solutions, through which the player can sense and interpret events and produce outputs for quick and successful
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More