Red pigmented undecylprodigiosin produced by Streptomyces coelicolor (A3)2 is a
promising drug owing to its characteristics of antibacterial, antifungal,
immunosuppressive and anticancer activities. The culture of S. coelicolor in liquid
medium produces mainly the blue pigmented actinorhodin and only low quantities of
undecylprodigiosin. From an industrial point of view, it is necessary to find a strategy to
improve undecylprodigiosin production. The present study provides evidence that
cultivation of S. coelicolor on solid substrate resulted in a reversal in this pattern of
antibiotic production as the production of undecylprodigiosin was significantly increased
and actinorhodin was completely suppressed. Four different solid substrate (wheat bran,
soya bean ground, rice husk and ground corn) were tested for their ability to support the
maximal production of undecylprodigiosin in solid state fermentation. Wheat bran
showed the highest production of undecylprodigiosin, starting from the first day of
incubation at a moisture level of (1:1 weight: volume) and reaching its maximum of 16
mg/gds on the fourth day. In addition, we report the exploitation of the interspecies
interaction in order to enhance undecylprodigiosin production by introducing live or
dead cells of E. coli, Bacillus subtilis and Saccharomyces cerevisiae, separately, to
Streptomyces coelicolor solid substrate fermentation. Our results revealed a significant
increase in the production of undecylprodigiosin in the elicited cultures compared with
control. The maximum enhancement occurred in the culture elicited with the live cells of
B. subtilis with an increase of 2-fold compared with control.
The automatic estimation of speaker characteristics, such as height, age, and gender, has various applications in forensics, surveillance, customer service, and many human-robot interaction applications. These applications are often required to produce a response promptly. This work proposes a novel approach to speaker profiling by combining filter bank initializations, such as continuous wavelets and gammatone filter banks, with one-dimensional (1D) convolutional neural networks (CNN) and residual blocks. The proposed end-to-end model goes from the raw waveform to an estimated height, age, and gender of the speaker by learning speaker representation directly from the audio signal without relying on handcrafted and pre-computed acou
... Show MoreWater balance approaches are strategies for resolving key theoretical and practical hydrological issues. The major goals of this study are to examine climatic elements and conditions to calculate groundwater recharge using the water balance approach. The study area is located in Mandaly city, Diyala Governorate, eastern Iraq. The metrological data was gathered between 1994 and 2020 to evaluate the study area's climate. The annual rainfall rate has been 248.61 mm, with a relative humidity of 43.89%, a temperature of 24.41 oC, a wind speed of 1.99 m/sec, sunshine of 8.32 hours per day, and evaporation of (268.09 mm). The total amount of corrected evapotranspiration was 1010.09 mm, with a peak value of 225.29 mm in Jul
... Show MoreMachine learning has a significant advantage for many difficulties in the oil and gas industry, especially when it comes to resolving complex challenges in reservoir characterization. Permeability is one of the most difficult petrophysical parameters to predict using conventional logging techniques. Clarifications of the work flow methodology are presented alongside comprehensive models in this study. The purpose of this study is to provide a more robust technique for predicting permeability; previous studies on the Bazirgan field have attempted to do so, but their estimates have been vague, and the methods they give are obsolete and do not make any concessions to the real or rigid in order to solve the permeability computation. To
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreIn this research paper, a new blind and robust fingerprint image watermarking scheme based on a combination of dual-tree complex wavelet transform (DTCWT) and discrete cosine transform (DCT) domains is demonstrated. The major concern is to afford a solution in reducing the consequence of geometric attacks. It is due to the fingerprint features that may be impacted by the incorporated watermark, fingerprint rotations, and displacements that result in multiple feature sets. To integrate the bits of the watermark sequence into a differential process, two DCT-transformed sub-vectors are implemented. The initial sub-vectors were obtained by sub-sampling in the host fingerprint image of both real and imaginary parts of the DTCWT wavelet coeffi
... Show MoreDatabase is characterized as an arrangement of data that is sorted out and disseminated in a way that allows the client to get to the data being put away in a simple and more helpful way. However, in the era of big-data the traditional methods of data analytics may not be able to manage and process the large amount of data. In order to develop an efficient way of handling big-data, this work studies the use of Map-Reduce technique to handle big-data distributed on the cloud. This approach was evaluated using Hadoop server and applied on EEG Big-data as a case study. The proposed approach showed clear enhancement for managing and processing the EEG Big-data with average of 50% reduction on response time. The obtained results provide EEG r
... Show More