In this research, the dynamics process of charge transfer from the sensitized D35CPDT dye to tin(iv) oxide( ) or titanium dioxide ( ) semiconductors are carried out by using a quantum model for charge transfer. Different chemical solvents Pyridine, 2-Methoxyethanol. Ethanol, Acetonitrile, and Methanol have been used with both systems as polar media surrounded the systems. The rate for charge transfer from photo-excitation D35CPDTdye and injection into the conduction band of or semiconductors vary from a to for system and from a to for the system, depending on the charge transfer parameters strength coupling, free energy, potential of donor and acceptor in the system. The charge transfer rate in D35CPDT / the system is larger than the rate in D35CPDT/ a system depending on transition energy and driving energy. However, the charge transfer for both systems to be large is associated with large transition energy, decreasing driving energy and potential, and increasing strength coupling with Methanol solvent.
The international organizations showed their interest in the marketable public relations, with their activities, means and strategies, they play a crucial role in marketing products, services and ideas of the institution. They are considered to be the link between the company and its public, They are responsible for presenting the institution to the public, with honest transmission of the information. This gives a good impression to the institution, in a way the institution and its products become consistent with the needs and interests of the public. Based on this, the research aims to identify the strategies used by the marketable public relations internationally. The r |
This paper aims to identify how the United Nations works through its website in prioritizing audiences towards international issues، by identifying the digital PR mechanisms used in digital PR contents in prioritizing audiences towards the international issues they deal with. To achieve the objectives of this paper, the researcher used the survey method and content analysis tool with a view to identifying the ranking of international issues on the website of health، peace and security، humanitarian assistance، human rights، women، migrants، refugees and displaced persons، economic development، United Nations affairs، culture and education، environment and climate، sustainable development, and law and crime prevention. One of
... Show MoreChilled ceilings systems offer potential for overall capital savings. The main aim of the present research is to investigate the thermal performance of the indirect contact closed circuit cooling tower, ICCCCT used with chilled ceiling, to gain a deeper knowledge in this important field of engineering which has been traditionally used in various industrial & HVAC systems. To achieve this study, experimental work were implemented for the ICCCCT use with chilled ceiling. In this study the thermal performances of closed wet cooling tower use with chilled ceiling is experimentally and theoretically investigated. Different experimental tests were conducted by varying the controlling parameters to investigate their effects
... Show MoreGiven a matrix, the Consecutive Ones Submatrix (C1S) problem which aims to find the permutation of columns that maximizes the number of columns having together only one block of consecutive ones in each row is considered here. A heuristic approach will be suggested to solve the problem. Also, the Consecutive Blocks Minimization (CBM) problem which is related to the consecutive ones submatrix will be considered. The new procedure is proposed to improve the column insertion approach. Then real world and random matrices from the set covering problem will be evaluated and computational results will be highlighted.
The traditional voice call over Global System for Mobile Communications (GSM) and Public Switched Telephone Network (PSTN) is expensive and does not provide a secure end to end voice transmission. However, the growth in telecommunication industry has offered a new way to transmit voice over public network such as internet in a cheap and more flexible way. Due to insecure nature of the public network, the voice call becomes vulnerable to attacks such as eavesdropping and call hijacking. Accordingly, protection of voice call from illegal listening becomes increasingly important.
To this end, an android-based application (named E2ESeVoice application) to transmit voice in a secure way between the end users is proposed based on modified R
In the early 1990s, as the beginning of the new unilateral leadership of global power by the United States, a new climate of rivalry emerged between revolutionary jihad and national jihad. Al-Qaeda has played on both sides to promote its agenda in support of global jihad. The veteran Afghan warriors returned to the Arab world after the play against the Soviet army "infidel" in Afghanistan after the Soviet invasion of Afghanistan in 1979 and until the disintegration of the Soviet Union in 1990. The Arab world is looking for roles to attract international forces seeking to implement specific projects that need a combat tool . Al-Qaeda has tried to exploit national conflicts and the emergence of sectarian political streams in the Middle Eas
... Show MoreIn this paper two ranking functions are employed to treat the fuzzy multiple objective (FMO) programming model, then using two kinds of membership function, the first one is trapezoidal fuzzy (TF) ordinary membership function, the second one is trapezoidal fuzzy weighted membership function. When the objective function is fuzzy, then should transform and shrinkage the fuzzy model to traditional model, finally solving these models to know which one is better