Kamel, S.H., R.F. Al-Jassani and H.A. Al-Shammari. 2022. Effects of Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis Isolates and Biologically Synthesized Silver Nanoparticles on Cellulase Enzyme Activity in Workers' Digestive System of the Termite Microcerotermes diversus Silv. Arab Journal of Plant Protection, 40(4): 315-324. https://doi.org/10.22268/AJPP-40.4.315324 The purpose of this study was to investigate the effect of different bacterial isolates of P. fluorescens and B. t. tenebrionis and silver nanoparticles on the activity of the cellulase enzyme in termites' middle digestive system and its role in glucose release by treating cellulose media with bacterial strains and nanoparticles. Ultraviolet spectroscopy results revealed that silver nanoparticles synthesized by P. fluorescens isolated from termites, commercial P. fluorescens, and local B.t. tenrbrionis had the highest absorption at 385, 324, and 324 nm wave length, respectively. Infrared spectroscopy (FTIR) revealed that ketons, amines, alkanes, and alcohols were among the groups that contributed to silver ions reduction, capping and stabilizing nanoparticles. The particle diameters were measured using a scanning electron microscope (SEM) and found to be on average 32.43, 63.19, and 57.62 nm. The highest concentration of liberated glucose was recorded after 24 hours, which ranged between 0.453 and 1.285 mg/ml when treated with silver nanoparticles prepared from a commercial isolate of P. fluorescens bacteria and when treated with a bacterial isolate P. fluorescens, respectively. Only when treated with synthesized silver nanoparticles and when treated with commercial P. fluorescens isolates did the lowest concentrations of liberated sugar reached between 0.037 and 0.730 mg/ml after 72 hours, respectively. The high quantity of liberated sugar in the control treatment was constant, reaching 1.70 and 2.33 mg/ml after 24 and 72 hours, respectively. In addition to the variation in cellulase enzyme inhibition rates in termite digestive systems due to the effect of different treatments, it was discovered that the local isolate of B. t. tenrbrionis was better than the rest of the isolates in affecting the enzyme, causing inhibition rates of 71.42%. Furthermore, silver nanoparticles synthesized from a commercial isolate of P. fluorescens outperformed other treatments in inhibiting enzyme activity, with an inhibition rate of 78.57% . Keywords: Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis, silver nanoparticles, Microcerotermes diversus
في هذا البحث تم تحضير المركبات المعدنية الجديدة لأيونات البلاتين (الرباعي) و الذهب (الثلاثي) مع ليكاند قاعدة مانخ جديد مشتق من السيبروفلوكساسين . تم استخدام المعقدات بعد ذلك كمصدر لتحضير جزيئات عن طريق ترسيب المعقدات على مسام دقائق السيليكا النانوية. Si/Au2O3 Si/PtO2 تم تشخيص الليكاند و معقداته
... Show MoreA large number of natural or synthetic dyes have been removed from both national and international lists of permitted food colors because of their mutagenic or carcinogenic activity. Therefore, this study aimed to use the Random Amplified Polymorphic DNA-Based Polymerase Chain Reaction (RAPD-PCR) assay as a feasible method to evaluate the ability of some food colors as genotoxin-induced DNA damage and mutations. Lactiplantibacillus plantarum was used as a bioindicator to determine the genotoxic effects by RAPD-PCR using M13 primer after treatment with some synthetic dyes currently used as food color additives, including Sunset Yellow, Carmoisine, and Tartrazine. Besides qualitative analysis, the bioinformatic GelJ software was used for clus
... Show MoreThe research aims to shed light on the nature of the tax gap in the income tax by the method of direct deduction and its reflection on the financial objective of the tax, and to determine the reasons for this gap in the deduction between the tax due in accordance with the laws and instructions in force and the tax actually paid. The tax gap is a real problem that cannot be ignored for what it represents loss of financial revenues due to the state.
The research problem is represented in the existence of a gap between the tax due according to direct deduction instructions and the tax actually paid according to the financial statements, and to achieve the objectives of the research and test the hypotheses, t
... Show MoreIn the present study, nanoporous material type MCM-41 was prepared by the sol-gel technique and was used as a carrier for prednisolone (PRD) drug delivery. The structural properties of mesoporous were fully characterized by X-ray diffraction (XRD), N2 adsorption /desorption and Fourier-transform infrared (FTIR). The mass transfer in term of adsorption process (loading) and desorption process (releasing) properties were investigated. The maximum drug loading efficiency was equal to 38% and 47.5% at different concentrations. The PRD released was prudently studied in water media of pH 6.8 simulated body fluid (SBF) in according to "United State Pharmacopeia (USP38)". The results proved that the release of prednisolone from MCM-41
... Show MoreAbstract
The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe current study aims to develop a proposed educational program based on augmented reality (AR) technology, in addition to assessing its effectiveness in developing research and historical imagination skills of the Humanities Track's female students at the secondary stage, as well as assessing the correlative and predictive relationships between the amount of growth for the two dependent variables. To achieve this, a secondary school in the city of Makkah Al-Mukarramah was chosen, and an available random sample of (30) female students from the study population was selected. The quasi-experimental approach was followed by this study, particularly one group design. In addition, two tools were used to collect study data, namely: a test of
... Show MoreIn this paper, two new simple, fast and efficient block matching algorithms are introduced, both methods begins blocks matching process from the image center block and moves across the blocks toward image boundaries. With each block, its motion vector is initialized using linear prediction that depending on the motion vectors of its neighbor blocks that are already scanned and their motion vectors are assessed. Also, a hybrid mechanism is introduced, it depends on mixing the proposed two predictive mechanisms with Exhaustive Search (ES) mechanism in order to gain matching accuracy near or similar to ES but with Search Time ST less than 80% of the ES. Also, it offers more control capability to reduce the search errors. The experimental tests
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show More