Within this paper, we developed a new series of organic chromophores based on triphenyleamine (TPA) (AL1, AL-2, AL-11 and AL-22) by engineering the structure of the electron donor (D) unit via replacing a phenyle ring or inserting thiophene as a π-linkage. For the sake of scrutinizing the impact of the TPA donating ability and the spacer upon the photovoltaic, absorptional, energetic, and geometrical characteristic of these sensitizers, density functional theory (DFT) and time-dependent DFT (TD-DFT) have been utilized. According to structural characteristics, incorporating the acceptor, π-bridge and TPA does not result in a perfect coplanar conformation in AL-22. We computed EHOMO, ELUMO and bandgap (Eg) energies by performing frequency a
... Show MoreAn impressed current cathodic protection system (ICCP) requires measurements of extremely low-level quantities of its electrical characteristics. The current experimental work utilized the Adafruit INA219 sensor module for acquiring the values for voltage, current, and power of a default load, which consumes quite low power and simulates an ICCP system. The main problem is the adaptation of the INA219 sensor to the LabVIEW environment due to the absence of the library of this sensor. This work is devoted to the adaptation of the Adafruit INA219 sensor module in the LabVIEW environment through creating, developing, and successfully testing a Sub VI to be ready for employment in an ICCP system. The sensor output was monitored with an Arduino
... Show MoreIn this paper we introduce several estimators for Binwidth of histogram estimators' .We use simulation technique to compare these estimators .In most cases, the results proved that the rule of thumb estimator is better than other estimators.
The tactical side in application of offensive plans in basketball did not take a large in scientific research because it always change because it related in mental ability of players and for the condition of the game and researchers notice that from their followed a lot of games for Duhok basketball club in Iraq league. There is a problem that connected in games results it clears in weakness in application of offensive plans in all kind (man to man & zone defense & side ball plans & under basketball and half court). The goal of study concentrate by designing a sheet for som offensive plans for study and analysis to Duhok club on Asian Championship 2011 at the base the sample contained (Iraq Duhok & application science Jordan & Lebanon sport
... Show MoreAsthma is a chronic inflammatory disorder of the airways in which many cells and cellular elements play a role. The treatment guidelines recommend theuse of a second controller drug in addition to medium doses of inhaled corticosteroids (ICSs) rather than the use of high doses ICS alone in the treatment of moderate-severe persistent asthma. This study was conducted to compare the clinical efficacy and safety of three treatment regimens in Iraqi patients with moderate-severe persistent asthma.The study included three groups; each group included 15 patients. Patients were administered beclomethasone inhaler alone 1500-2000 μg/day, beclomethasone inhaler 750-1000 μg/day plus oral controlled release aminophylline tablets 450 mg/day or
... Show MoreIn recent years, the consideration of natural products as anti-inflammatory and antioxidative treatments has more interested worldwide. Moreover, natural products are easily obtained and are relatively safe the Royal jelly (RJ) is one of them. The current study was carried to evaluate the effects of pregabalin (PGB) on physiological activity of sperms, reproductive hormones assay and some biochemical analysis. Forty (40) male albino rats (10-weeks-old) were divided into four groups (10 rats each): G1 (treated with PGB drug, 150 mg/kg B.wt (Lyrica-Pfizer-Pharmaceutical Industries), G2 (treated with RJ 1g/kg), G3 (treated with PGB drug and RJ together), and G4 control treated with norma
The current study includes 144 samples were 106 bacterial samples belonging to the clinical sources, 38 bacterial samples belonging to the environmental sources to investigate the presence of bacteria P. aeruginosa. The results of diagnosis clarified that there are 45 bacterial isolates belonging to the bacterium P. aeruginosa The examination of the sensitivity of all bacterial isolates was done for elected 45 isolation towards the 11 antibiotic by spread method on the dishes. The results showed that the resistance ratio toward Cefixim, Cefotaxim, Tetracycline, Amoxicillin, Cloxacillin, Methicillin, Erythromycin and Naldixic acid was 77.7, 73.3, 84.4, 82.2, 80, 77.7, 77.7 and 73.3 respectively, While most isolates were sensitive to all o
... Show MoreAbstract
The curriculum is amodern science which reflects the social philosophy and
what it needs . It searches for amothod that limits the knowledge that the
indiridual gets in the society and the sorts of the culture that suits the enrironment
in which they live. It also clears for them their history and their great in heritance.
It has a great in flunce in their mental growth ,and it teacher the students new
roles in the thin king ,and training then on what they have learned . According to
there points the problem concentrats on the mostimpotant difficulties which facer
thestudents in studing Arabic langnage text-books
In spite of the great care that the text taker but it is full of subjects and studies
w
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More