G-system composed of three isolates G3 ( Bacillus),G12 ( Arthrobacter )and G27 ( Brevibacterium) was used to detect the mutagenicity of the anticancer drug, cyclophosphamide (CP) under conditions similar to that used for standard mutagen, Nitrosoguanidine (NTG). The CP effected the survival fraction of isolates after treatment for 15 mins using gradual increasing concentrations, but at less extent comparing to NTG. The mutagenic effect of CP was at higher level than that of NTG when using streptomycin as a genetic marker, but the situation was reversed when using rifampicin resistant as a report marker. The latter effect appeared upon recording the mutagen efficiency (ie., number of induced mutants/microgram of mutagen). Measuring the Relative mutability revealed that isolate G12 was highly mutable by both mutagens. The Relative mutational results showed also that isolate G12 is more sensitive, except when recording rifampicin resistance as a genetic marker, and this pattern was similar to NTG.
The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com
... Show More1-[4-(2-Hydroxy-4, 6-dimethyl-phenylazo)-phenol]-ethanone (HL1) and 2-(4-methoxy-phenylazo)-3, 5- dimethyl-phenol (HL2) were produced by combination the diazonium salts of amines with 3, 5- dimethylphenol. The geometry of azo compounds was resolved on the basis of (C.H.N) analyses, 1H and 13CNMR, FT-IR and UV-Vis spectroscopic mechanisms. Complexes of La (III) and Rh (III) have been performed and depicted. The formation of complexes has been identified by using elemental analysis, FTIR and UV-Vis spectroscopic process as well, conductivity molar quantifications. Nature of complexes produced have been studied obeyed mole ratio and continuous alteration ways, Beer's law followed through a concentration scope (1×10-4 - 3×10-4 M). High molar
... Show MoreThis research aims to identify the impact of the reciprocal reading strategy on developing the innovative reading skills of fifth-grade secondary school students/ scientific branch. To achieve the goal of the research, an achievement test to measure the academic achievement of fifth-grade secondary school students in Arabic language grammar was prepared, a sample of (60) female students from the secondary school of Al- Bawaba Al-Sharkey for Girls in Baghdad were chosen for the academic year (2019-2020). For the purpose of applying the experiment, the test was applied on a pilot sample consisting of (30) students from the same research community. The researcher herself had taught the three
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreDuring the last few yt:ars, au increase :n ut ilization of contact ienses (both cosmetic and correction of refractive errors lenses) was noticed among yotmg females, with an increase in eye infections. The present i nvocation was carried out to demonstrate the percentage of bacter ial contamination of both the preservation fluid and lens oonlainers. Fifty two contact lenses users among female students and em I ployees of
college of Education-Ibn Al- Haitham were surveyed. Data were
obtained on methodof usage and results of microbial examination. The &nb
... Show MoreSuccinic acid is an essential base ingredient for manufacturing various industrial chemicals. Succinic acid has been acknowledged as one of the most significant bio based building block chemicals. Rapid demand for succinic acid has been noticed in the last 10 years. The production methods and mechanisms developed. Hence, these techniques and operations need to be revised. Recently, an omnibus rule for developing succinic acid is to find renewable carbohydrate Feedstocks. The sustainability of the resource is crucial to disintegrate the massive use of petroleum based-production. Accordingly, systematically reviewing the latest findings of bacterial production and related fermentation methods is critical. Therefore, this paper aims to stud
... Show MoreIn this research is estimated the function of reliability dynamic of multi state systems and their compounds and for three types of systems (serial, parallel, 2-out-of-3) and about two states (Failure and repair) depending on calculating the structur function allow to describing the behavior of
With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and
... Show More