G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
Kombucha(Khubdat Humza) is composed of yeast and acetic acid bacteria especially, Acetobacter xylinum which forms a cellulose pellicle on tea broth. Kombucha(Khubdat Humza) produces bacterial cellulose pellicles, with unique purity and fine structure. It can be used in many forms, such as an emulsifier, stabilizer, dispersing agent, thickener and gelling agent but these are generally subsidiary to its most important use of holding on to water. Recently, bacterial cellulose is used in many special applications such as a scaffold for tissue engineering of cartilages and blood vessels, also for artificial skin for temporary covering of wounds, as well as its used in the clothing industry. The yield of cellulose produced were investiga
... Show MoreThe event of crossing the barriers is one of the Power Games activities that have received great attention in the field of researches. Which led to ma..
Diverse organismsuch as mammals and fishes exposure to noxious waste in the surroundings is a continuous routine and the active absorption and propagation of contaminants in humans is through the food chain. In order to determine the level of toxicity across the food chain,this research was structured to identify some biochemical alterations in the hepatic tissue of rats fed cadmium, cyanide and a mixture of cyanide and cadmium contaminated catfish diet. Fish were assigned into four groups and were exposed to both toxicants (cadmium and cyanide) in the single and combined states. Each toxicant was administered as cadmium chloride (CdCl2) and potassium cyanide (KCN) on a dose of 0.4 mg of the toxicant/100 ml water
... Show MoreA comparison of gas sensing performance of V2O5:Ag nanoparticles as thin film and as bulk pellet toward NO2 and NH3 is presented. V2O5:Ag nanoparticles thin films were deposited by vacuum thermal evaporation method on glass substrates while the pellets were prepared by powder technology. XRD patterns of thin film and pellet were polycrystalline with an orthorhombic structure. The value of average grain size is about 60 nm. The morphological properties of the samples have been distinguished by atomic force microscopy (AFM) and field effect scanning electron microscopy (FESEM) which indicated that the films showed homogeneous surfaces morphology a
... Show MoreIn the present paper, Arabic Character Recognition Edge detection method based on contour and connected components is proposed. First stage contour extraction feature is introduced to tackle the Arabic characters edge detection problem, where the aim is to extract the edge information presented in the Arabic characters, since it is crucial to understand the character content. The second stage connected components appling for the same characters to find edge detection. The proposed approach exploits a number of connected components, which move on the character by character intensity values, to establish matrix, which represents the edge information at each pixel location .
... Show MoreCryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreConcentrations and distribution of major, minor, and trace elements were
studied in thirteen sediment samples from Al-Hammar Marsh.
Multivariate statistical techniques such as Principal Component Analysis (PCA)
and Agglomerative Hierarchal Cluster Analysis (AHCA) as well as pollution
analysis such as Enrichment Factor (EF) were used to process the data and identify
the possible sources of elemental constituents in sediment samples.Results of
chemical analysis revealed that Major element mean concentrations were in the
order of Ca> Si> K> Mg> and minor elements were in the order of Al> Fe>S>Cl>
Ti> P>Mn> Sr> N and trace elements were in the order of Cr> Ni> Zr>V>Zn>