The present study was conducted to determine the effect of different concentrations of putrescine and spermidine at all stages of regeneration (callogenesis, somatic embryos multiplication, germination and rooting)) of date palm cultivar Barhee. Shoot tips were eradicated from 2-3 years old offshoots, surface sterilized and inoculated onto Murashiege and Skoog, 1962 (MS) medium supplemented with 20 mg/L 2,4-D and 3 mg/L N6-2-isopentyl adenine (2ip). Primary callus was obtained after 24 weeks on the nutrient medium. Calli were then transferred onto fresh MS medium containing 0.0, 50, 100 or 150 mg/L of putrescine or spermidine individually. Results were recorded after 12 weeks. A significant increase in embryonic callus fresh weights reached 4.093 g at the concentration 100mg/l of Spermidine and 3.817 g at 100 mg/L of putrescine. Embryogenic callus was developed on MS media using different concentration 0,50,100 or 150mg/L of putrescine or spermidine. Results indicated that the highest embryo number reached 28.67embryo at the concentration 100mg/L of spermidine. The highest significant root number 5.20 root/plant appeared with rooting medium supplemented 100mg/l of Spermidine. Addition of Putrescine as a supplement to the rooting medium at concentrations 100mg/l reached 2.60 root/plant. It is concluded that both putrescine and spermidine may play a positive role in increasing callus growth and regulation of somatic embryogenesis in Phoenix dactylifera var. Brahee tissue cultures.
This research was conducted to measure the safety of heat stable enterotoxin a (STa) produced by enterotoxigenic Escherichia coli, through studying its toxic effect on human blood lymphocyte, since it showed a promising effect in reducing the proliferation of colorectal cancer cells. the cytogenetic effects of (STa) by using five different concentrations (100, 200, 400, 800 and 1600μg/ml) in comparison with negative (PBS, Phosphate buffer saline) and positive (MMC, Mitomycin C) at concentration of 5μg/ml, controls on human blood lymphocytes obtained from both (10) normal healthy persons and (20) colorectal cancer patients was measured by employing the following parameters: mitotic index, blast index, chromosomal aberrations and micronucle
... Show MoreNew, simple and sensitive batch and reverse FIA spectrophotometric methods for the determination of doxycycline hyclate in pure form and in pharmaceutical preparations were proposed. These methods based on oxidative coupling reaction between doxycycline hyclate and 3-methylbenzothiazolinone-2-hydrazone hydrochloride (MBTH) in the presence ammonium ceric sulfate in acidic medium, to form green water-soluble dye that is stable and has a maximum absorbance at 626 nm. A calibration graph shows that a Beer's law is obeyed over the concentration range of 1-80 and 0.5-110 ?g.mL-1 of DCH for the batch and rFIA respectively with detection limit of 0.325 ?g.mL-1 of DCH for r-FIA methods. All different chemicals and physical experimental paramete
... Show MoreThis research aims to find out the phonemic, dialect and semantic ailments that were interrogated by the book of the parsing of thirty surahs of the Noble Qur’an by Ibn Khalawiyeh, by examining some phonemic phenomena of Qur’anic expressions and their explanatory relationships that resulted in their occurrence, such as substitution and compression, as the sounds in a word are affected by one another, especially during performance and composition. This influence and influence is the tendency of the human being to the law of ease, facilitation, and the reduction of muscular effort in speech often, all for the purpose of obtaining phonemic harmony for the compound letters; To facilitate pronunciation; And get rid of the muscular effort
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreThe efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t
... Show MoreThis paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft
... Show MoreThis work is concerned with the design and performance evaluation of a shell and double concentric tubes heat exchanger using Solid Works and ANSY (Computational Fluid Dynamics).
Computational fluid dynamics technique which is a computer-based analysis is used to simulate the heat exchanger involving fluid flow, heat transfer. CFD resolve the entire heat exchanger in discrete elements to find: (1) the temperature gradients, (2) pressure distribution, and (3) velocity vectors. The RNG k-ε model of turbulence is used to determining the accurate results from CFD.
The heat exchanger design for this work consisted of a shell and eight double concentric tubes. The number of inlets are three and that of o
... Show MoreAutomatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris
... Show MoreA submoduleA of amodule M is said to be strongly pure , if for each finite subset {ai} in A , (equivalently, for each a ?A) there exists ahomomorphism f : M ?A such that f(ai) = ai, ?i(f(a)=a).A module M is said to be strongly F–regular if each submodule of M is strongly pure .The main purpose of this paper is to develop the properties of strongly F–regular modules and study modules with the property that the intersection of any two strongly pure submodules is strongly pure .