Preferred Language
Articles
/
RharhIcBVTCNdQwCvVTU
Heterojunction Solar Cell Based on Highly-Pure Nanopowders Prepared by DC Reactive Magnetron Sputtering
...Show More Authors

In this work, a novel design for the NiO/TiO2 heterojunction solar cells is presented. Highly-pure nanopowders prepared by dc reactive magnetron sputtering technique were used to form the heterojunctions. The electrical characteristics of the proposed design were compared to those of a conventional thin film heterojunction design prepared by the same technique. A higher efficiency of 300% was achieved by the proposed design. This attempt can be considered as the first to fabricate solar cells from highly-pure nanopowders of two different semiconductors.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 10 2017
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
BRCA1 is Overexpressed in Breast Cancer Cell Lines and is Negatively Regulated by E2F6 in Normal but not Cancerous Breast Cells
...Show More Authors

This study focused on the expression and regulation of BRCA1 in breast cancer cell lines compared to normal breast. BRCA1 transcript levels were assessed by real time quantitative polymerase chain reaction (RT-qPCR) in the cancer cell lines. Our data show overexpression of BRCA1 mRNA level in all the studied breast cancer cell lines: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 along with Jurkat, leukemia T-lymphocyte, the positive control, relative to normal breast tissue. To investigate whether a positive or negative correlation exists between BRCA1 and the transcription factor E2F6, three different si-RNA specific for E2F6 were used to transfect the normal and cancerous breast cell lines. Interestingly, strong negative relationship was found b

... Show More
Preview PDF
Publication Date
Thu Jan 24 2019
Journal Name
Multifaceted Protocol In Biotechnology
Culturing and Maintaining Mammalian Cell Culture
...Show More Authors

Mammalian cell culture refers to culturing mammalian cells in a medium that provide nutrients for cells to be able to grow in vitro under environment that closely mimic the in vivo conditions. By enabling culturing these cells outside living biological entities, investigation on intra- and intercellular activities and flux; genetic and phenotyping analysis; proteomics, study of toxicology, drug discovery and development can be carried out without manipulation of living animals. In this chapter, detail protocol of media preparation, cell culture maintenance and preservation are elaborated for both types of mammalian cell culture, monolayer or suspension cultures. Determination of number of cells is discussed as well.

Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Manufacturing electrolysis cell for hydrogen production
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Oral Health And Preventive Dentistry
Antioxidant and Antineoplastic Activities of Hibiscus sabdariffa Linn. Petal Extracts against Oral Squamous Cell Carcinoma Cell Line
...Show More Authors

Purpose: To assess the antioxidant and antineoplastic effects of Hibiscus sabdariffa Linn. on oral squamous cell carcinoma cells. Materials and Methods: Human squamous cell carcinoma HSCC cells were tested for cytotoxicity by a methanol extract of Hibiscus sabdariffa (MEHSP). After 24, 48, and 72 ...

View Publication
Scopus (1)
Scopus
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Improving Voltage Stability in Kurdistan Power System in Areas with Deficit Power Production by Rescheduling the Active Power Based on PSS/E Simulation
...Show More Authors

This paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref