Polyaromatic hydrocarbons (PAHs) are a group of aromatic compounds that contain at least two rings. These compounds are found naturally in petroleum products and are considered the most prevalent pollutants in the environment. The lack of microorganism capable of degrading some PAHs led to their accumulation in the environment which usually causes major health problems as many of these compounds are known carcinogens. Xanthene is one of the small PAHs which has three rings. Many xanthene derivatives are useful dyes that are used for dyeing wood and cosmetic articles. However, several studies have illustrated that these compounds have toxic and carcinogenic effects. The first step of the bacterial degradation of xanthene is conducted by dioxygenase enzymes that introduces two oxygen atoms in the structure of the aromatic rings. In this study we focused on the bacterial bioremediation of xanthene via Sphingobium yanoikuyae B1DR, an engineered strain carrying the dioxin angular dioxygenase from Sphingomonas wittichii RW1. HPLC analysis of supernatant from resting cells of S. yanoikuyae B1DR grown on xanthene and succinate showed the ability of this strain to transform xanthene to 2-hydroxyphenylacetate that was not produced by the wild type of Sphingobium yanoikuyae B1. Production of 2-hydroxyphenylacetate was confirmed by GC-MS. Our results show the importance of this strain in reducing the toxic effects of xanthene in the environment and showed for the first time that ring-hydroxylation enzymes and hydrolases for biphenyl degradation in S. yanoikuyae B1 may function on metabolites generated from the degradation pathway of xanthene. By analyzing our results we were able to draw a novel pathway for xanthene degradation in S. yanoikuyae B1DR.
Background: Acute lung injury (ALI) is among the most serious conditions characterized by an exacerbation of inflammatory response that can result from a persistent lung infection. Carvone is chiral monoterpenoid ketone present in the essential oils of dill, caraway, and spearmint. It shows antioxidant, anti-inflammatory, and antimicrobial effects among others. In this study, the lung anti-inflammatory and protective effects and potential mechanism of action of carvone were investigated in ALI induced by Lipopolysaccharide (LPS).
The reliability of optical sources is strongly dependent on the degradation and device characteristics are critically dependent on temperature. The degradation behaviours and reliability test results for the laser diode device (Sony-DL3148-025) will be presented .These devices are usually highly reliable. The degradation behaviour was exhibited in several aging tests, and device lifetimes were then estimated. The temperature dependence of 0.63?m lasers was studied. An aging test with constant light power operation of 5mW was carried out at 10, 25, 50 and 70°C for 100hours. Lifetimes of the optical sources have greatly improved, and these optical sources can be applied to various types of transmission systems. Within this degradation range,
... Show MoreAntibiotics resistant bacteria have become a global problem as a result of the unprogrammed use of antibiotics, resulting in bacterial strains resistant to many antibiotics, or to all available antibiotics. Plants are a good source of primary and secondary metabolites that have a major role in reducing silver nitrate to silver nanoparticles (AgNPs). The production of these nanoparticles were carried out by using aqueous extract of Carthamus oxycantha M.Bieb. This can be verified by color change of the reaction solution from yellow to dark brown because of the excitation of the surface plasmon resonance. AgNPs were characterized by UV-Vis spectroscopy, where they recorded the peak at 420 nm. Fourier Transformation-infrared (FTIR)
... Show MoreThe control charts are one of the scientific technical statistics tools that will be used to control of production and always contained from three lines central line and upper, lower lines to control quality of production and represents set of numbers so finally the operating productivity under control or nor than depending on the actual observations. Some times to calculating the control charts are not accurate and not confirming, therefore the Fuzzy Control Charts are using instead of Process Control Charts so this method is more sensitive, accurate and economically for assisting decision maker to control the operation system as early time. In this project will be used set data fr
... Show MorePraise be to God, Lord of the worlds, and prayers and peace be upon our master and beloved Muhammad, the wise guide and great teacher, the guide to a straight path, the one sent as a mercy to the worlds, and upon his good and chosen family, his chosen companions, the working scholars, and those who follow them in righteousness until the Day of Judgment.
And after:
One of the important controversial topics shared between the sciences of the Noble Hadith and the Fundamentals of God is the issue of the innovator in terms of accepting and rejecting his narration and testimony, and the difference in it leads to disagreement in many branches of jurisprudence that were based on texts narrated by innovated narrators or those accu
... Show MoreIn this study is the phenomenon of desertification risk assessment in the Abu Ghraib area west of Baghdad/Iraq, which has an area of about (384.168 km 2), that the annual mean temperature is more than (22 C). Rainfall was low, ranging from the (200 mm) per year for Iraq and (2.82) mm per year of the study area* temperature is high and evaporation is also high (mm 7.73) per year*, so the climate in general of the dry type and the system of soil moisture is the kind of Aridic (Torric). To this study was to identify three indicators to monitor for the period from 2001-2005 using GIS and these indicators are (soil, groundwater and the nature of land use), using ArcGIS 9.1. The results showed that the risk of desertification was part of the leve
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More