Microalgae have been used widely in bioremediation processes to degrade or adsorb toxic dyes. Here, we evaluated the decolorization efficiency of Chlorella vulgaris and Nostoc paludosum against two toxic dyes, crystal violet (CV) and malachite green (MG). Furthermore, the effect of CV and MG dyes on the metabolic profiling of the studied algae has been investigated. The data showed that C. vulgaris was most efficient in decolorization of CV and MG: the highest percentage of decolorization was 93.55% in case of MG, while CV decolorization percentage was 62.98%. N. paludosum decolorized MG dye by 77.6%, and the decolorization percentage of CV was 35.1%. Metabolic profiling of C. vulgaris and N. paludosum were performed using NMR spectroscopy. Based on 1D and 2D NMR data, 43 compounds were identified in the polar extract of C. vulgaris, while 34 polar metabolites were successfully determined in N. paludosum. The identified compounds included carbohydrates, amino acids, organic acids, dipeptides, steroids and phenols. Statistical analysis was carried out to recognize the pattern of metabolite variation between control and dye treated samples. Principal component analysis (PCA) and hierarchical cluster analysis showed that samples treated with MG are clearly separated from the control in both types of algae. Based on heat map data, the level of carbohydrates and amino acids concentrations are strongly affected by bioremediation of MG dye compared with CV dye. In conclusion, the present study proved that CV and MG dyes are considered as stress factors and the studied algae species exert their bioremediation activity without the dyes being absorbed into the cells.
Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t
... Show MoreCandida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project
... Show MoreThe aim of this work is studying many concepts of a pure submodule related to sub-module L and introducing the two concepts, T_pure submodule related to submodule and the crossing property of T_pure related to submodule. Another characterizations and study some properties of this concept.
Fusarium wilt causes economic losses on tomatoes every year. Thus, a variety of chemicals have been used to combat the disease. Pesticides have been effective in managing the disease, but they keep damaging the environment. Recently, eco-friendly approaches have been used to control plant diseases. This study aimed to achieve an environmentally safe solution using biological agents to induce systemic resistance in tomato plants to control Fusarium wilt disease caused by Fusarium oxysporum f.sp. lycopersici (FOL) in the greenhouse. The pathogen (FOL) has been molecularly confirmed and the biological agents have been isolated from the Iraqi environment. The effectiveness of the biological agents has been tested and confirmed. Results showed t
... Show MoreToday with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned
Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user
... Show MoreGivers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.
This encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.
In this respect the Audit function comes to che
... Show MoreThe research starts from a fundamental problem about how top management team can realize the uncertainty. Strategic conversation has been introduced as a way for top management team to deal with uncertainties. Within the current research model, the strategic conversation was considered as an independent variable and uncertainty as dependent variable. The researcher used the survey method by distributed a questionnaire in the Administration and Economics College, University of Baghdad. Samples are 40 faculty participant of scientific committee members were distributed in seven scientific departments. The data were statistically analyzed by mean and the standard deviation. The hypotheses were tested through the use of correlation and regressi
... Show More