Quantitative real-time Polymerase Chain Reaction (RT-qPCR) has become a valuable molecular technique in biomedical research. The selection of suitable endogenous reference genes is necessary for normalization of target gene expression in RT-qPCR experiments. The aim of this study was to determine the suitability of each 18S rRNA and ACTB as internal control genes for normalization of RT-qPCR data in some human cell lines transfected with small interfering RNA (siRNA). Four cancer cell lines including MCF-7, T47D, MDA-MB-231 and Hela cells along with HEK293 representing an embryonic cell line were depleted of E2F6 using siRNA specific for E2F6 compared to negative control cells, which were transfected with siRNA not specific for any gene. Using RT-qPCR, Ct (threshold cycle) values of 18S and ACTB were determined in transfected cells and compared with control cells. In the selection of the above cell lines, 18S was identified as the most stably expressed reference gene than ACTB in gene knockdown experiments.
The main purpose of the research is to diagnose the importance of the role that strategic memory plays with its three variables (content, structure, and processes) in helping the human resource department to use the COSO model with its five components (culture and governance, strategy and objectives, performance, communications and information, and feedback) in auditing activities and tasks Her own. As the research problem emphasized the existence of a lack of cognitive perception, of the importance of strategic memory, and the investment of its components in the rationalization of the application of the COSO model. and therefore it can be emphasized that the importance of the research is to provide treatments for problems relate
... Show MorePurpose: to demonstrate the possibility of moving to electronic data exchange dimensions (regulatory requirements, technical requirements, human requirements, senior management support) to simplify the work procedures dimensions (modern procedures, clarity of procedures, short procedures, availability of information and means required. The simplicity of the models used because of its importance to keep abreast of recent developments in the service of municipal works through the application of electronic data interchange, which simplifies procedures and out of the routine in the performance of the work of municipal departments has developed. It was applied to Municipality (Hilla) so that the transformation
... Show MoreIncreasing the power conversion efficiency (PCE) of silicon solar cells by improving their junction properties or minimizing light reflection losses remains a major challenge. Extensive studies were carried out in order to develop an effective antireflection coating for monocrystalline solar cells. Here we report on the preparation of a nanostructured cerium oxide thin film by pulsed laser deposition (PLD) as an antireflection coating for silicon solar cell. The structural, optical, and electrical properties of a cerium oxide nanostructure film are investigated as a function of the number of laser pulses. The X-ray diffraction results reveal that the deposited cerium oxide films are crystalline in nature and have a cubic fluorite. The field
... Show MoreIn this paper, the human robotic leg which can be represented mathematically by single input-single output (SISO) nonlinear differential model with one degree of freedom, is analyzed and then a simple hybrid neural fuzzy controller is designed to improve the performance of this human robotic leg model. This controller consists from SISO fuzzy proportional derivative (FPD) controller with nine rules summing with single node neural integral derivative (NID) controller with nonlinear function. The Matlab simulation results for nonlinear robotic leg model with the suggested controller showed that the efficiency of this controller when compared with the results of the leg model that is controlled by PI+2D, PD+NID, and F
... Show MoreA free convective heat transfer from the inside surface of a uniformly heated vertical circular tube has been experimentally investigated under a constant wall heat flux boundary condition for laminar air flow in the ranges of RaL from 6.9108 to 5109. The effect of the different sections (restrictions) lengths placed at the exit of the heated tube on the surface temperature distribution, the local and average heat transfer coefficients were examined. The experimental apparatus consists of aluminum circular tube with 900 mm length and 30 mm inside diameter (L/D=30). The exit sections (restrictions) were included circular tubes having the same inside diameter as the heated tube but with different lengths of
... Show MoreBackground: Invasion in oral cancer involves alterations in cell-cell and cell-matrix interactions that accompanied by loss of cell adhesion. Catenins stabilize cellular adherence junctions by binding to E-cadherin, which further mediates cell-cell adhesion and regulates proliferation and differentiation of epithelial cells. The Wnt/β-catenin pathway is one of the major signaling pathways in cell proliferation, oncogenesis, and epithelial-mesenchymal transition. Aims of the study: to detect immunohistochemical distribution pattern and different subcellular localization of β-catenin in oral squamous cell carcinoma and relate such expression to Bryne’s invasive grading system. Materials and Methods: This study included 30 paraffi
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show More