Polyaromatic hydrocarbons (PAHs) are a group of aromatic compounds that contain at least two rings. These compounds are found naturally in petroleum products and are considered the most prevalent pollutants in the environment. The lack of microorganism capable of degrading some PAHs led to their accumulation in the environment which usually causes major health problems as many of these compounds are known carcinogens. Xanthene is one of the small PAHs which has three rings. Many xanthene derivatives are useful dyes that are used for dyeing wood and cosmetic articles. However, several studies have illustrated that these compounds have toxic and carcinogenic effects. The first step of the bacterial degradation of xanthene is conducted by dioxygenase enzymes that introduces two oxygen atoms in the structure of the aromatic rings. In this study we focused on the bacterial bioremediation of xanthene via Sphingobium yanoikuyae B1DR, an engineered strain carrying the dioxin angular dioxygenase from Sphingomonas wittichii RW1. HPLC analysis of supernatant from resting cells of S. yanoikuyae B1DR grown on xanthene and succinate showed the ability of this strain to transform xanthene to 2-hydroxyphenylacetate that was not produced by the wild type of Sphingobium yanoikuyae B1. Production of 2-hydroxyphenylacetate was confirmed by GC-MS. Our results show the importance of this strain in reducing the toxic effects of xanthene in the environment and showed for the first time that ring-hydroxylation enzymes and hydrolases for biphenyl degradation in S. yanoikuyae B1 may function on metabolites generated from the degradation pathway of xanthene. By analyzing our results we were able to draw a novel pathway for xanthene degradation in S. yanoikuyae B1DR.
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show MoreIn this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additional flexibil
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreA series of heterogeneous basic catalysts of CaO, MgO and CaMgO2 at different calcination temperature were synthesized via solution combustion method. Different characterization techniques have been carried out to investigate the structure of the produced catalysts i.e. X-ray diffraction (XRD), particle size analyzer, morphology by atomic force microscope (AFM) and reflection using UV-VIS diffuse reflectance spectra. The particles size analyzer revealed that the mixed oxide catalysts calcined at different calcination temperature possess smaller nano size particles compared to pure CaO. Moreover, the energy band gap was calculated based on the results of diffuse reflectance spectra. The energy band gap was redu
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreA common approach to the color image compression was started by transform
the red, green, and blue or (RGB) color model to a desire color model, then applying
compression techniques, and finally retransform the results into RGB model In this
paper, a new color image compression method based on multilevel block truncation
coding (MBTC) and vector quantization is presented. By exploiting human visual
system response for color, bit allocation process is implemented to distribute the bits
for encoding in more effective away.
To improve the performance efficiency of vector quantization (VQ),
modifications have been implemented. To combines the simple computational and
edge preservation properties of MBTC with high c
The research includes a description of the controversial issues mentioned by Ibn Al-Anbari in his book between the Egyptians, Basra and Kufa. The reason for choosing the book is because it