Preferred Language
Articles
/
bRYAfooBVTCNdQwCOJ6M
Extracellular Enzyme of Endophytic Fungi Isolated from Ziziphus spina Leaves as Medicinal Plant
...Show More Authors

Endophytic fungi live inside plants or any part of them without creating any visible pathogenic signs. Endophytic fungi are found within medicinal plants and have shown strong biologic activity, such as anticancer and antioxidant activities, as well as producing extracellular enzymes. In this study, different fungal strains were isolated from the leaves of the medicinal plant Ziziphus spina, including Aspergillus flavus, Aspergillus fumigatus, Aspergillus niger, Cladosporium sp., Rhizopus sp., and Mucor sp. Extracellular enzymes have been quantified using agar plate-based methods in which fungi were grown in specified growth media to detect the enzymes produced. The results showed that A. niger has the highest ability to produce amylase, Cladosporium sp. has the highest ability to produce protease and pectinase, Rhizopus and Mucor sp. have the highest ability to produce cellulase, and A. niger and Cladosporium sp. have the same ability to produce lipase and laccase. The ability of medicinal plant endophytic fungi to produce extracellular enzymes has great therapeutic potential in clinical microbiology. Some of the isolates showed great activity in secreting particular enzymes, indicating that the enzymes of these fungi could be used in a variety of applications.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Preparation Activated Carbon from Scrap Tires by Microwave Assisted KOH Activation for Removal Emulsified Oil
...Show More Authors

In this paper activated carbon adsorbents produced from waste tires by chemical activation methods and application of microwave assisted KOH activation. The influence of radiation time, radiation power, and impregnation ratio on the yield and oil removal which is one of the major environmental issues nowadays and considered persistent environmental contaminants and many of them are suspected of being carcinogenic. Based on Box-Wilson central composite design, polynomial models were developed to correlate the process variables to the two responses. From the analysis of variance the significant variables on each response were identified.  Optimum conditions of 4 min radiation time, 700 W radiation power and 0.5 g/g impregnation ratio

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Economic Research
Credit derivatives: Do they matter to avoid credit exposure? (Some evidences from the US market)
...Show More Authors

Credit derivatives (CDs) have been increasingly acknowledged as an important requirement to hedge and transfer credit risk CR. Nonetheless, they have been extensively criticized for destabilizing the whole economic system bringing about the latest subprime credit crisis. The study’s main aim is to investigate the reason for the use of (CDs), whether it is used for hedging or trade purpose, for four of the US international financial institutions that had made it through the 2007 crisis to resume functioning post-crisis. This will be for three different and critical periods, namely the pre, during and after crisis periods (Q1, 2000-Q1, 2014). Adopting the SUR technique, the investigation of the factors that influence the net position of (CD

... Show More
Scopus (2)
Scopus
Publication Date
Wed Sep 01 2021
Journal Name
Iranian Endodontic Journal
Smear Layer Removal from the Apical Third Using the Er,Cr:YSGG Photon-induced Photoacoustic Streaming
...Show More Authors

Scopus (10)
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Chemical Engineering And Processing - Process Intensification
Cobalt Removal from Simulated Wastewaters Using a Novel Flow-by Fixed Bed Bio-electrochemical Reactor
...Show More Authors

View Publication
Scopus (33)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Odd Fibonacci edge irregular labeling for some trees obtained from subdivision and vertex identification operations
...Show More Authors

Let G be a graph with p vertices and q edges and  be an injective function, where k is a positive integer. If the induced edge labeling   defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Desalination And Water Treatment
Extraction model to remove antibiotics from aqueous solution by emulsion and Pickering emulsion liquid membrane
...Show More Authors

View Publication
Scopus (11)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Oct 15 2024
Journal Name
Mongolian Journal Of Chemistry
Using activated and modified adsorbent surfaces from banana peels to remove the green Janus dye:
...Show More Authors

In order for the process of removing pollutants, including dyes, from the aquatic environment to be effective, plant wastes such as banana peels were used as adsorbent surfaces by thermally activating them (ABP) and modifying them with iron oxide nanoparticles (MABP), which were characterized using Fourier transform infrared (FT-IR) and X-ray diffraction (XRD) techniques. They were applied in the field of Janus green (JG) dye adsorption for the batch system and studied the effect of several factors (adsorbent weight, contact time, initial concentration, and temperature). Their data were analyzed kinetically using first- and second-order kinetic models and they were found to follow the second order. Their data were also analyzed thro

... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Wed Aug 03 2022
Journal Name
Egyptian Journal Of Chemistry
A Novel Bio-electrochemical Cell with Rotating Cylinder Cathode for Cadmium Removal from Simulated Wastewater
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Enhancing Nitrate Ion Removal from Water using Fixed Bed Columns with Composite Chitosan-based Beads
...Show More Authors

    Water contamination is a pressing global concern, especially regarding the presence of nitrate ions. This research focuses on addressing this issue by developing an effective adsorbent for removing nitrate ions from aqueous solutions. two adsorbents Chitosan-Zeolite-Zirconium (Cs-Ze-Zr composite beads and Chitosan-Bentonite-Zirconium Cs-Bn-Zr composite beads were prepared. The study involved continuous experimentation using a fixed bed column with varying bed heights (1.5 and 3 cm) and inlet flow rates (1 and 3 ml/min). The results showed that the breakthrough time increased with higher bed heights for both Cs-Ze-Zr and Cs-Bn-Zr composite beads. Conversely, an increase in flow rate led to a decrease in breakthrough time. Notab

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref