In this study water-soluble N-Acetyl Cysteine Capped-Cadmium Telluride QDs (NAC/CdTe nanocrystals) using N-acetyl cysteine as a stabilizer were prepared to investigate the utility of quantum dots (QDs) in distinguishing damaged DNA, (extracted from blood samples of leukaemia patients), from intact DNA (extracted from blood samples of healthy individuals) to be used for biosensing application. Based on the optical characterization of the prepared QDs, the XRD results revealed the formation of the NAC-CdTe-QDs with a grain size of 7.1nm. Whereas, the SEM test showed that the spherical size of the NAC-CdTe-QDs lies within 11~33nm. NAC-CdTe-QDs have superior PL emission properties at of 550nm and UV-Vis absorption peak at 300nm. The energy gap measurement through PL and UV–Vis was found to be 2.2eV and 2.3 eV, respectively. The interaction between the synthesized QDs and the extracted genomic DNA (both cancer damaged DNA and healthy undamaged DNA) was analysed optically, and compared to the normal reference DNA. The results showed a shift in the maximum fluorescence emission intensities (observed at 540nm nm for a damaged sample and 535 for a reference cell). Based on the obtained fluorescence results, the present study reached the conclusion that the prepared core/shell QDs could be employed as probes for diagnosing genetically disrupted DNA that is associated with malignant diseases from healthy DNA.
The paper reports the influence of annealing temperature under vacuum for one hour on the some structural and electrical properties of p-type CdTe thin films were grown at room temperature under high vacuum by using thermal evaporation technique with a mean thickness about 600nm. X-ray diffraction analysis confirms the formation of CdTe cubic phase at all annealing temperature. From investigated the electrical properties of CdTe thin films, the electrical conductivity, the majority carrier concentration, and the Hall mobility were found increase with increasing annealing temperatures.
Abstract:
The aim of the research is to demonstrate the impact of the professional specialization of the audit companies in the detection of fraud in the financial statements of the economic units listed in the Iraqi market for securities for the period 2014-2015 through the application of the model (Carcello) to test the hypothesis of research on the impact of professional specialization of audit companies in the detection of fraud in lists The effect of the variables was revealed through the use of statistical models of logistic regression model and correlation coefficient. After testing the hypotheses of the research, a number of conclusions were reached. The most important was the existence of a signi
... Show More
Ground Penetrating Radar (GPR) is a nondestructive geophysical technique that uses electromagnetic waves to evaluate subsurface information. A GPR unit emits a short pulse of electromagnetic energy and is able to determine the presence or absence of a target by examining the reflected energy from that pulse. GPR is geophysical approach that use band of the radio spectrum. In this research the function of GPR has been summarized as survey different buried objects such as (Iron, Plastic(PVC), Aluminum) in specified depth about (0.5m) using antenna of 250 MHZ, the response of the each object can be recognized as its shapes, this recognition have been performed using image processi |
In the pandemic era of COVID19, software engineering and artificial intelligence tools played a major role in monitoring, managing, and predicting the spread of the virus. According to reports released by the World Health Organization, all attempts to prevent any form of infection are highly recommended among people. One side of avoiding infection is requiring people to wear face masks. The problem is that some people do not incline to wear a face mask, and guiding them manually by police is not easy especially in a large or public area to avoid this infection. The purpose of this paper is to construct a software tool called Face Mask Detection (FMD) to detect any face that does not wear a mask in a specific
... Show MoreTax fraud is following different methods of tax evasion (bypassing the laws, instructions and regulations related to tax) by not showing the real taxable income by using laws, instructions and regulations improperly, and because of the weak basic role of forensic accounting in detecting and reducing tax fraud, the problem has become more influential on the state general tax income. The main objective of the research is to identify forensic accounting and the extent to how it can be applied in the General Tax Authority to assist forensic authorities in issuing judgments in fraud cases. To achieve the objectives of the research, the descriptive analytical approach was used to reach the topic of the research, and a questionnaire (co
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More