Quantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Using RT-qPCR, Ct (threshold cycle) values of 18S and ACTB were determined in transfected cells and compared with control cells. In the selection of the above cell lines, 18S was identified as the most stably expressed reference gene than ACTB in gene knockdown experiments.
According to grammarians In ( نإ) and Itha (اذإ) are conditionals and sometimes they may be used interchangeably. However, when they are mentioned in the Holy Qur’an, they have their own specific use. This paper attempts to investigate their meanings in the source language as well as investigate their translations and find out any differences or similarities. The translations that are adopted in this research are as follows: Pickthall, Al-Hilali & Khan, and Shakir.
The reduction of vibration properties for composite material (woven roving E-glass fiber plies in thermosetting polyester matrix) is investigated at the prediction time under varied combined temperatures (60 to -15) using three types of boundary conditions like (CFCF, CCCF, and CFCC). The vibration properties are the amplitude, natural frequency, dynamic elastic moduli (young modulus in x, y directions and shear modulus in 1, 2 plane) and damping factor. The natural frequency of a system is a function of its elastic properties, dimensions, and mass. The woven roving glass fiber has been especially engineered for polymer reinforcement; but the unsaturated thermosetting polyester is widely used, offering a good balance of vibration p
... Show MoreIn real conditions of structures, foundations like retaining walls, industrial machines and platforms in offshore areas are commonly subjected to eccentrically inclined loads. This type of loading significantly affects the overall stability of shallow foundations due to exposing the foundation into two components of loads (horizontal and vertical) and consequently reduces the bearing capacity.
Based on a numerical analysis performed using finite element software (Plaxis 3D Foundation), the behavior of model strip foundation rested on dry sand under the effect of eccentric inclined loads with different embedment ratios (D/B) ranging from (0-1) has been explored. The results display that, the bearing capacity of st
... Show MoreReinforced concrete slabs are one of the most important and complicated elements of a building. For supported edges slabs, if the ratio of long span to short span is equal or less than two then the slab is considered as two-way slab otherwise is consider as one-way slab. Two-way reinforced concrete slabs are common in use in reinforced concrete buildings due to geometrically arrangement of columns suggested by architects who prefer a symmetric distribution of columns in their plans. Elastic theory is usually used for analysis of concrete slabs. However, for several reasons design methods based on elastic principles are limited in their function. Correspondingly, limit state analysis o
In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo
... Show MoreThe City of Ember is a very interesting novel that is although intended for young readers, have so many layers and messages that are misunderstood. In this research, both the novel and the film adaptation are studied with the intent to decode the warning messages that the novelist and the director tried to introduce to the audience. The research studies four vital messages; the first message is that history repeats itself for the novel has many allusions to the history of Jews and their painful holocaust and even goes back in history the days of Moses and the Exodus, the second message tackles the conspiracy theory that states nothing happens by accident and that everything is planned and connected hence comes the third message
... Show MoreProblem: Cancer is regarded as one of the world's deadliest diseases. Machine learning and its new branch (deep learning) algorithms can facilitate the way of dealing with cancer, especially in the field of cancer prevention and detection. Traditional ways of analyzing cancer data have their limits, and cancer data is growing quickly. This makes it possible for deep learning to move forward with its powerful abilities to analyze and process cancer data. Aims: In the current study, a deep-learning medical support system for the prediction of lung cancer is presented. Methods: The study uses three different deep learning models (EfficientNetB3, ResNet50 and ResNet101) with the transfer learning concept. The three models are trained using a
... Show MoreWith time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More