115 research outputs found
Environmental Impacts of Dredging Reclamation and Coastal Modifications in Coral Reef Islands, a Case Study from Maldives
Fabrication and analysis of dye-sensitized solar cell using natural dye extracted from dragon fruit
Dragon fruit dye has been prepared and used in the fabrication of DSSC as sensitizer. The properties of dragon fruit dye have been investigated by UV-Vis and FTIR technique. The absorption spectrum shows a peak value of 535 nm. Chemically dragon fruit dye shows present of intermolecular H-bond, conjugate C=O stretching and esters acetates C-O-C stretching vibration, which is due to the component of anthocyanin. On the other hand, the resistivity of TiO2 film on ITO glass before it is used for the fabrication of DSSC is also investigated. The TiO2 sheet resistivity increase from 1 layer = 22.1 Ω cm to 2 layers = 369.6 Ω cm. Finally, the efficiency of assemble DSSC was evaluated and simulated using a custom made technique. The result shows fill factor, Pmax and efficiency during the present of halogen lamp are 0.30, 13 μW, 0.22%, respectively. We have successfully showed that the DSSC using dragon fruit as a dye sensitizer is useful for the preparation of environmental friendly and low-cost DSSC
Coupling distance in Graphs
In this paper the coupling distance of simple connected graphs are introduced. The different parameters of coupling distance like coupling eccentricity, coupling radius, coupling diameter, coupling center and coupling periphery are defined. The coupling parameters for different standard graphs are obtained
Transversal Eccentric Domination in Graphs
We introduce transversal eccentric dominating(TED) set. An eccentric dominating set is called a TED-set if it intersects with every minimum eccentric dominating set . We find the TED-number of some standard graphs. Results are stated and proved
Equitable eccentric domination in graphs
In this paper, we define equitable eccentric domination in graphs. An eccentric dominating set S ⊆ V (G) of a graph G(V, E) is called an equitable eccentric dominating set if for every v ∈ V − S there exist at least one vertex u ∈ V such that |d(v) − d(u)| ≤ 1 where vu ∈ E(G). We find equitable eccentric domination number γeqed(G) for most popular known graphs. Theorems related to γeqed(G) have been stated and proved
Single cell analysis of neutrophils NETs by Microscopic LSPR imaging system
A simple microengraving cell monitoring method for neutrophil extracellular traps
(NETs) released from single neutrophils has been realized using a polydimethylsiloxane (PDMS)
microwell array (MWA) sheet on a plasmon chip platform. An imbalance between NETs formation
and the succeeding degradation (NETosis) are considered associated with autoimmune disease and
its pathogenesis. Thus, an alternative platform that can conduct monitoring of this activity on single
cell level at minimum cost but with great sensitivity is greatly desired. The developed MWA
plasmon chips allow single cell isolation of neutrophils from 150 μL suspension (6.0 × 105 cells/mL)
with an efficiency of 36.3%; 105 microwells with single cell condition. To demonstrate the utility of
the chip, trapped cells were incubated between 2 to 4 h after introducing with 100 nM phorbol 12-
myristate 13-acetate (PMA) before measurement. Under observation using a hyperspectral imaging
system that allows high-throughput screening, the neutrophils stimulated by PMA solution show a
significant release of fibrils and NETs after 4 h, with observed maximum areas between 314–758
μm2. An average absorption peak wavelength shows a redshift of Δλ = 1.5 nm as neutrophils release
NETs
Intracellular Kinases Mediate Increased Translation and Secretion of Netrin-1 from Renal Tubular Epithelial Cells
Background: Netrin-1 is a laminin-related secreted protein, is highly induced after tissue injury, and may serve as a marker of injury. However, the regulation of netrin-1 production is not unknown. Current study was carried out in mouse and mouse kidney cell line (TKPTS) to determine the signaling pathways that regulate netrin-1 production in response to injury. Methods and Principal Findings: Ischemia reperfusion injury of the kidney was induced in mice by clamping renal pedicle for 30 minutes. Cellular stress was induced in mouse proximal tubular epithelial cell line by treating with pervanadate, cisplatin, lipopolysaccharide, glucose or hypoxia followed by reoxygenation. Netrin-1 expression was quantified by real time RT-PCR and protein production was quantified using an ELISA kit. Cellular stress induced a large increase in netrin-1 production without increase in transcription of netrin-1 gene. Mitogen activated protein kinase, ERK mediates the drug induced netrin-1 mRNA translation increase without altering mRNA stability. Conclusion: Our results suggest that netrin-1 expression is suppressed at the translational level and MAPK activation leads to rapid translation of netrin-1 mRNA in the kidney tubular epithelial cells
Guidance Cue Netrin-1 and the Regulation of Inflammation in Acute and Chronic Kidney Disease
Deep learning and big data technologies for IoT security
Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches. Therefore, it is necessary to develop fool proof solutions by creating new technologies or combining existing technologies to address the security issues. Deep learning, a branch of machine learning has shown promising results in previous studies for detection of security breaches. Additionally, IoT devices generate large volumes, variety, and veracity of data. Thus, when big data technologies are incorporated, higher performance and better data handling can be achieved. Hence, we have conducted a comprehensive survey on state-of-the-art deep learning, IoT security, and big data technologies. Further, a comparative analysis and the relationship among deep learning, IoT security, and big data technologies have also been discussed. Further, we have derived a thematic taxonomy from the comparative analysis of technical studies of the three aforementioned domains. Finally, we have identified and discussed the challenges in incorporating deep learning for IoT security using big data technologies and have provided directions to future researchers on the IoT security aspects
Does Getting a Degree Pay
Since an increase in opportunities has resulted in the pool of degree holders in Singapore to significantly increase over the last few decades, a re-examination of the relationship between salary and highest education qualification is necessary. The purpose of this study is to ascertain whether receiving a degree rather than gaining work experience leads to higher earnings during this degree inflation era. In 2022, this will be the first study in Singapore to examine a person\u27s wage in relation to their highest level of education. The existing literature tends to find higher returns for the university degree holders, although the impact of degrees varies depending on the university ranking and regions. We propose using both primary data collected through an online survey as well as secondary data obtained from data.gov, a government database, to conduct our studies. We will then use data analysis techniques like the T-Test, ANOVA, regression models, and correlation to examine the data. The preliminary data results revealed that a degree is still a crucial factor in Singaporeans earning more than their non-degree counterparts
- …