The ability of four local fungal isolates for extracellular laccase production has been tested with five grams 1:1(w/v) humidified sawdust as substrate in mineral salt medium. After 21 day of incubation at 25±1 ? C and using one mycelial plug (5mm), higher level of laccase activity (0.15U/ml) and specific activity (15U/mg) were observed by Pleurotus ostreatus in comparison with other fungal isolates. The results of optimum conditions for laccase production from selected isolate showed that, the maximum laccase activity (0.55U/ml) and specific activity (55U/mg) were obtained at moisture ratio 1:3 (w/v), using 3 mycelial plugs (5 mm), after 15 days incubation period at 25±1 ? C. The results of phenol degradation by crud laccase revealed that, 100% degradation of phenol occurred after 24 hr of incubation at 25 ? C using shaking water bath except at 200mg/l, the remaining phenol was 10.13%.
The research problem stems from the suffering of organizations from the weakness of their organizing aspect and the weak influence of the leadership on the subordinates and their dispersion. Organizations today are in rapid development and therefore work relations are not dominated by the humanitarian aspect and the first goal has become productivity. The research aims to identify the influence of servant leadership and its dimensions as an independent variable on the effectiveness of work teams as an approved variable and their importance increases when these organizations are service organizations, and how their influence increases when this leadership is the servant leadership and its dimensions in the Health Depa
... Show MoreOptical spectrum of SN1987A at days 4 from the explosion and its light curve through the first 1444 days after the explosion have been studied. The hydrogen lines present in the spectrum confirms the general characteristics of Type II SN that occur due to core collapse of massive star. Each of the total mass ejected from the explosion and the amount of the total mass of Nickel radioactive isotopes that produced during the explosion as well as the initial velocity of the ejecta and the explosion energy have been determined and compared with different observed and calculated models obtained by different researchers and it’s found that, about 8.8 Mʘ of the progenitor envelope mass had been ejected during the explosion and it’s mixed with
... Show MoreObtaining the computational models for the functioning of the brain gives us a chance to understand the brain functionality thoroughly. This would help the development of better treatments for neurological illnesses and disorders. We created a cortical model using Python language using the Brian simulator. The Brian simulator is specialized in simulating the neuronal connections and synaptic interconnections. The dynamic connection model has multiple parameters in order to ensure an accurate simulation (Bowman, 2016). We concentrated on the connection weights and studied their effect on the interactivity and connectivity of the cortical neurons in the same cortical layer and across multiple layers. As synchronization helps us to mea
... Show MoreThis article discusses a discussion of trends and patterns of understanding and application of the concept of metaphor to various subjects that may interfere with the perspective of metaphors in translation theory, an attempt was made to use the principles and characteristics of metaphors and their fundamental tradition in translation theory, and to uncover the perspective of considering metaphor as a conceptual process. presenting its merits, since it is still considered an eccentric expression of linguistics.
Any person, regardless of his location in the air, whether he was kidnapped or trained, and then he performs a certain work, believes that his work is in vain, and by God, his deeds. I wonder if those who hold him in the first place will be safe in good form. He said that the essence of justice in the story is the story:
These are given the meaning we have fought in the fact that each group of. He went beyond creating a group of blocs, sects, and parties. If justice indicated one meaning, these relationships between people and peace would diminish. In fact, justice has only one concept, but there are several associations with it in the field of divorced one of these synonyms. However, the variation in racist drums in the encounte
... Show MoreA medical- service platform is a mobile application through which patients are provided with doctor’s diagnoses based on information gleaned from medical images. The content of these diagnostic results must not be illegitimately altered during transmission and must be returned to the correct patient. In this paper, we present a solution to these problems using blind, reversible, and fragile watermarking based on authentication of the host image. In our proposed algorithm, the binary version of the Bose_Chaudhuri_Hocquengham (BCH) code for patient medical report (PMR) and binary patient medical image (PMI) after fuzzy exclusive or (F-XoR) are used to produce the patient's unique mark using secret sharing schema (SSS). The patient’s un
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr
... Show More
