Preferred Language
Articles
/
bsj-4726
Bioremediation Potential of Chlorella vulgaris and Nostoc paludosum on azo Dyes with Analysis of Metabolite Changes
...Show More Authors

               Microalgae have been used widely in bioremediation processes to degrade or adsorb toxic dyes. Here, we evaluated the decolorization efficiency of Chlorella vulgaris and Nostoc paludosum against two toxic dyes, crystal violet (CV) and malachite green (MG). Furthermore, the effect of CV and MG dyes on the metabolic profiling of the studied algae has been investigated. The data showed that C. vulgaris was most efficient in decolorization of CV and MG: the highest percentage of decolorization was 93.55% in case of MG, while CV decolorization percentage was 62.98%. N. paludosum decolorized MG dye by 77.6%, and the decolorization percentage of CV was 35.1%. Metabolic profiling of C. vulgaris and N. paludosum were performed using NMR spectroscopy. Based on 1D and 2D NMR data, 43 compounds were identified in the polar extract of C. vulgaris, while 34 polar metabolites were successfully determined in N. paludosum. The identified compounds included carbohydrates, amino acids, organic acids, dipeptides, steroids and phenols. Statistical analysis was carried out to recognize the pattern of metabolite variation between control and dye treated samples. Principal component analysis (PCA) and hierarchical cluster analysis showed that samples treated with MG are clearly separated from the control in both types of algae. Based on heat map data, the level of carbohydrates and amino acids concentrations are strongly affected by bioremediation of MG dye compared with CV dye. In conclusion, the present study proved that CV and MG dyes are considered as stress factors and the studied algae species exert their bioremediation activity without the dyes being absorbed into the cells.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Laboratory Investigation on Roller Compaction Technique in Concrete Construction
...Show More Authors

Roller compacted concrete (RCC) is a concrete compacted by roller compaction. The concrete mixture in its unhardened state must support a roller while being compacted. The aim of this research work was to investigate the behavior and properties of roller compacted concrete when constructed in the laboratory using roller compactor manufactured in local market to simulate the field conditions. The roller compaction was conducts in three stages; each stage has different loading and number of passes of the roller. For the first stage, a load of (24) kg and (5) passes in each direction had been employed. For the second stage, a load of (104) kg and (10) passes in each direction were conducted. Finally, at the third stage, a load of (183) kg a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Computer Science And Mobile Computing
Image Compression based on Non-Linear Polynomial Prediction Model
...Show More Authors

Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
A Brief view on the pediatric COVID- 19 pandemic
...Show More Authors

The world is currently challenging the serious effects of the pandemic of the Coronavirus disease (COVID-19) caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2). Data on pediatric COVID are rare and scattered in the literature. In this article, we presented the updated knowledge on the pediatric COVID-19 from different aspects. We hope it will increase the awareness of the pediatricians and health care professionals on this pandemic.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Fast Temporal Video Segmentation Based on Krawtchouk-Tchebichef Moments
...Show More Authors

View Publication
Scopus (41)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Interdisciplinary Mathematics
On ⱨ - supra open sets in supra topological spaces
...Show More Authors

The significance fore supra topological spaces as a subject of study cannot be overstated, as they represent a broader framework than traditional topological spaces. Numerous scholars have proposed extension to supra open sets, including supra semi open sets, supra per open and others. In this research, a notion for ⱨ-supra open created within the generalizations of the supra topology of sets. Our investigation involves harnessing this style of sets to introduce modern notions in these spaces, specifically supra ⱨ - interior, supra ⱨ - closure, supra ⱨ - limit points, supra ⱨ - boundary points and supra ⱨ - exterior of sets. It has been examining the relationship with supra open. The research was also enriched with many

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
Study on approximate analytical methods for nonlinear differential equations
...Show More Authors

In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.

Scopus (11)
Scopus
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Fri Mar 01 2019
Journal Name
Neurocomputing
A survey on video compression fast block matching algorithms
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref