In this work, a novel design for the NiO/TiO2 heterojunction solar cells is presented. Highly-pure nanopowders prepared by dc reactive magnetron sputtering technique were used to form the heterojunctions. The electrical characteristics of the proposed design were compared to those of a conventional thin film heterojunction design prepared by the same technique. A higher efficiency of 300% was achieved by the proposed design. This attempt can be considered as the first to fabricate solar cells from highly-pure nanopowders of two different semiconductors.
This study focused on the expression and regulation of BRCA1 in breast cancer cell lines compared to normal breast. BRCA1 transcript levels were assessed by real time quantitative polymerase chain reaction (RT-qPCR) in the cancer cell lines. Our data show overexpression of BRCA1 mRNA level in all the studied breast cancer cell lines: MCF-7, T47D, MDA-MB-231 and MDA-MB-468 along with Jurkat, leukemia T-lymphocyte, the positive control, relative to normal breast tissue. To investigate whether a positive or negative correlation exists between BRCA1 and the transcription factor E2F6, three different si-RNA specific for E2F6 were used to transfect the normal and cancerous breast cell lines. Interestingly, strong negative relationship was found b
... Show MoreMammalian cell culture refers to culturing mammalian cells in a medium that provide nutrients for cells to be able to grow in vitro under environment that closely mimic the in vivo conditions. By enabling culturing these cells outside living biological entities, investigation on intra- and intercellular activities and flux; genetic and phenotyping analysis; proteomics, study of toxicology, drug discovery and development can be carried out without manipulation of living animals. In this chapter, detail protocol of media preparation, cell culture maintenance and preservation are elaborated for both types of mammalian cell culture, monolayer or suspension cultures. Determination of number of cells is discussed as well.
Purpose: To assess the antioxidant and antineoplastic effects of Hibiscus sabdariffa Linn. on oral squamous cell carcinoma cells. Materials and Methods: Human squamous cell carcinoma HSCC cells were tested for cytotoxicity by a methanol extract of Hibiscus sabdariffa (MEHSP). After 24, 48, and 72 ...
<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation
... Show MoreThis paper aims to improve the voltage profile using the Static Synchronous Compensator (STATCOM) in the power system in the Kurdistan Region for all weak buses. Power System Simulation studied it for Engineers (PSS\E) software version 33.0 to apply the Newton-Raphson (NR) method. All bus voltages were recorded and compared with the Kurdistan region grid index (0.95≤V ≤1.05), simulating the power system and finding the optimal size and suitable location of Static Synchronous Compensator (STATCOM)for bus voltage improvement at the weakest buses. It shows that Soran and New Koya substations are the best placement for adding STATCOM with the sizes 20 MVAR and 40 MVAR. After adding STATCOM with the sizes [20MVAR and 40MV
... Show MoreCryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show More