115 research outputs found

    Fabrication and analysis of dye-sensitized solar cell using natural dye extracted from dragon fruit

    Get PDF
    Dragon fruit dye has been prepared and used in the fabrication of DSSC as sensitizer. The properties of dragon fruit dye have been investigated by UV-Vis and FTIR technique. The absorption spectrum shows a peak value of 535 nm. Chemically dragon fruit dye shows present of intermolecular H-bond, conjugate C=O stretching and esters acetates C-O-C stretching vibration, which is due to the component of anthocyanin. On the other hand, the resistivity of TiO2 film on ITO glass before it is used for the fabrication of DSSC is also investigated. The TiO2 sheet resistivity increase from 1 layer = 22.1 Ω cm to 2 layers = 369.6 Ω cm. Finally, the efficiency of assemble DSSC was evaluated and simulated using a custom made technique. The result shows fill factor, Pmax and efficiency during the present of halogen lamp are 0.30, 13 μW, 0.22%, respectively. We have successfully showed that the DSSC using dragon fruit as a dye sensitizer is useful for the preparation of environmental friendly and low-cost DSSC

    Coupling distance in Graphs

    Get PDF
    In this paper the coupling distance of simple connected graphs are introduced. The different parameters of coupling distance like coupling eccentricity, coupling radius, coupling diameter, coupling center and coupling periphery are defined. The coupling parameters for different standard graphs are obtained

    Transversal Eccentric Domination in Graphs

    Get PDF
    We introduce transversal eccentric dominating(TED) set. An eccentric dominating set DD is called a TED-set if it intersects with every minimum eccentric dominating set D′D'. We find the TED-number γted\gamma_{ted} of some standard graphs. Results are stated and proved

    Equitable eccentric domination in graphs

    Get PDF
    In this paper, we define equitable eccentric domination in graphs. An eccentric dominating set S ⊆ V (G) of a graph G(V, E) is called an equitable eccentric dominating set if for every v ∈ V − S there exist at least one vertex u ∈ V such that |d(v) − d(u)| ≤ 1 where vu ∈ E(G). We find equitable eccentric domination number γeqed(G) for most popular known graphs. Theorems related to γeqed(G) have been stated and proved

    Single cell analysis of neutrophils NETs by Microscopic LSPR imaging system

    Get PDF
    A simple microengraving cell monitoring method for neutrophil extracellular traps (NETs) released from single neutrophils has been realized using a polydimethylsiloxane (PDMS) microwell array (MWA) sheet on a plasmon chip platform. An imbalance between NETs formation and the succeeding degradation (NETosis) are considered associated with autoimmune disease and its pathogenesis. Thus, an alternative platform that can conduct monitoring of this activity on single cell level at minimum cost but with great sensitivity is greatly desired. The developed MWA plasmon chips allow single cell isolation of neutrophils from 150 μL suspension (6.0 × 105 cells/mL) with an efficiency of 36.3%; 105 microwells with single cell condition. To demonstrate the utility of the chip, trapped cells were incubated between 2 to 4 h after introducing with 100 nM phorbol 12- myristate 13-acetate (PMA) before measurement. Under observation using a hyperspectral imaging system that allows high-throughput screening, the neutrophils stimulated by PMA solution show a significant release of fibrils and NETs after 4 h, with observed maximum areas between 314–758 μm2. An average absorption peak wavelength shows a redshift of Δλ = 1.5 nm as neutrophils release NETs

    Intracellular Kinases Mediate Increased Translation and Secretion of Netrin-1 from Renal Tubular Epithelial Cells

    Get PDF
    Background: Netrin-1 is a laminin-related secreted protein, is highly induced after tissue injury, and may serve as a marker of injury. However, the regulation of netrin-1 production is not unknown. Current study was carried out in mouse and mouse kidney cell line (TKPTS) to determine the signaling pathways that regulate netrin-1 production in response to injury. Methods and Principal Findings: Ischemia reperfusion injury of the kidney was induced in mice by clamping renal pedicle for 30 minutes. Cellular stress was induced in mouse proximal tubular epithelial cell line by treating with pervanadate, cisplatin, lipopolysaccharide, glucose or hypoxia followed by reoxygenation. Netrin-1 expression was quantified by real time RT-PCR and protein production was quantified using an ELISA kit. Cellular stress induced a large increase in netrin-1 production without increase in transcription of netrin-1 gene. Mitogen activated protein kinase, ERK mediates the drug induced netrin-1 mRNA translation increase without altering mRNA stability. Conclusion: Our results suggest that netrin-1 expression is suppressed at the translational level and MAPK activation leads to rapid translation of netrin-1 mRNA in the kidney tubular epithelial cells

    Deep learning and big data technologies for IoT security

    Get PDF
    Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. Therefore, it is necessary to develop fool proof solutions by creating new technologies or combining existing technologies to address the security issues. Deep learning, a branch of machine learning has shown promising results in previous studies for detection of security breaches. Additionally, IoT devices generate large volumes, variety, and veracity of data. Thus, when big data technologies are incorporated, higher performance and better data handling can be achieved. Hence, we have conducted a comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies. Further, a comparative analysis and the relationship among deep learning, IoT security, and big data technologies have also been discussed. Further, we have derived a thematic taxonomy from the comparative analysis of technical studies of the three aforementioned domains. Finally, we have identified and discussed the challenges in incorporating deep learning for IoT security using big data technologies and have provided directions to future researchers on the IoT security aspects

    Does Getting a Degree Pay

    Get PDF
    Since an increase in opportunities has resulted in the pool of degree holders in Singapore to significantly increase over the last few decades, a re-examination of the relationship between salary and highest education qualification is necessary. The purpose of this study is to ascertain whether receiving a degree rather than gaining work experience leads to higher earnings during this degree inflation era. In 2022, this will be the first study in Singapore to examine a person\u27s wage in relation to their highest level of education. The existing literature tends to find higher returns for the university degree holders, although the impact of degrees varies depending on the university ranking and regions. We propose using both primary data collected through an online survey as well as secondary data obtained from data.gov, a government database, to conduct our studies. We will then use data analysis techniques like the T-Test, ANOVA, regression models, and correlation to examine the data. The preliminary data results revealed that a degree is still a crucial factor in Singaporeans earning more than their non-degree counterparts
    • …
    corecore