Kamel, S.H., R.F. Al-Jassani and H.A. Al-Shammari. 2022. Effects of Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis Isolates and Biologically Synthesized Silver Nanoparticles on Cellulase Enzyme Activity in Workers' Digestive System of the Termite Microcerotermes diversus Silv. Arab Journal of Plant Protection, 40(4): 315-324. https://doi.org/10.22268/AJPP-40.4.315324 The purpose of this study was to investigate the effect of different bacterial isolates of P. fluorescens and B. t. tenebrionis and silver nanoparticles on the activity of the cellulase enzyme in termites' middle digestive system and its role in glucose release by treating cellulose media with bacterial strains and nanoparticles. Ultraviolet spectroscopy results revealed that silver nanoparticles synthesized by P. fluorescens isolated from termites, commercial P. fluorescens, and local B.t. tenrbrionis had the highest absorption at 385, 324, and 324 nm wave length, respectively. Infrared spectroscopy (FTIR) revealed that ketons, amines, alkanes, and alcohols were among the groups that contributed to silver ions reduction, capping and stabilizing nanoparticles. The particle diameters were measured using a scanning electron microscope (SEM) and found to be on average 32.43, 63.19, and 57.62 nm. The highest concentration of liberated glucose was recorded after 24 hours, which ranged between 0.453 and 1.285 mg/ml when treated with silver nanoparticles prepared from a commercial isolate of P. fluorescens bacteria and when treated with a bacterial isolate P. fluorescens, respectively. Only when treated with synthesized silver nanoparticles and when treated with commercial P. fluorescens isolates did the lowest concentrations of liberated sugar reached between 0.037 and 0.730 mg/ml after 72 hours, respectively. The high quantity of liberated sugar in the control treatment was constant, reaching 1.70 and 2.33 mg/ml after 24 and 72 hours, respectively. In addition to the variation in cellulase enzyme inhibition rates in termite digestive systems due to the effect of different treatments, it was discovered that the local isolate of B. t. tenrbrionis was better than the rest of the isolates in affecting the enzyme, causing inhibition rates of 71.42%. Furthermore, silver nanoparticles synthesized from a commercial isolate of P. fluorescens outperformed other treatments in inhibiting enzyme activity, with an inhibition rate of 78.57% . Keywords: Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis, silver nanoparticles, Microcerotermes diversus
Thermal energy storage is an important component in energy units to decrease the gap between energy supply and demand. Free convection and the locations of the tubes carrying the heat-transfer fluid (HTF) have a significant influence on both the energy discharging potential and the buoyancy effect during the solidification mode. In the present study, the impact of the tube position was examined during the discharging process. Liquid-fraction evolution and energy removal rate with thermo-fluid contour profiles were used to examine the performance of the unit. Heat exchanger tubes are proposed with different numbers and positions in the unit for various cases including uniform and non-uniform tubes distribution. The results show that
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreThe present research tackles a number of historical facts and incidents with a purely legal dimension in an important stage in the contemporary history of Iraq, especially the era of the British occupation. This resulted in innumerable social, political and legal problems, particularily the judicial legislation problems in Iraq. These legislations included a set of civil laws and in force governmental procedures that will be discussed historically by examining documents issued by the Ministries of Justice and Interior Affairs in the governments of monarchy for the period from 1921-to-1958. The data of the present paper relied on the Iraqi Library and Archives, (hence DKW). The study adopted the narrative historical methodology when inves
... Show MoreBackground: To evaluate the effect of antierosive agents (10% Nano-Hydroxyapatite (NHA), 10% Casein Phophopeptide-Amorphous Calcium Phosphate (CPP-ACP), and combination of 10% NHA and 10% CPP-ACP) on loss of minerals from enamel surface of permanent teeth treated with antierosive agents when exposed to an acidic beverage and investigate the morphological changes of treated enamel surface after demineralization with cola based beverage under Scanning Electron Microscope (SEM). Materials and Methods: Sixty maxillary first premolars were randomly divided into four groups, 15 teeth for each group. Group I treated with 10% NHA, Group II treated with 10% CPP-ACP, Group III treated with 10% NHA and 10% CPP-ACP, and Group IV did not treat with any
... Show More