This study was aimed to isolate and identify Saccharomyces boulardii from Mangosteen fruits (Garcinia mangostana L.) by traditional and molecular identification methods To get safe and healthy foods probiotics for use, The isolates and two commercial strains were subjected to cultural, morphological and biochemical tests, The colonies of the isolates were spherical, smooth, mucoidal, dull and white to cream colour on SD agar media .The shape of cells was globose to ovoid and sometimes with budding, in a single form or clustered like a beehive. The isolates and two commercial strains were unable to metabolized galactose and lactose , Results shows that all isolates were unable to utilize potassium nitrate and not grow in the presence of (0.01%) cyclohexamide. Also the isolates and two commercial strains were identified by the Vitek 2 identification system, as S. cerevisiae with probability 90-94%, Since there are no data in this device includes S. boulardii. Because the cultural, morphological and biochemical tests didn’t provide sufficient evidence to distinguish between S. boulardii and S. cerevisiae, the probiotics strains must be identified up to genus and strain levels by internationally accepted methods, So the SbR7 isolate which shown high probiotic advantages and two commercial strains were diagnosed molecularly by using specific primers targeting sequence for the region (ITS) of the 5.8S rRNA gene Genomic DNA was isolated from SbR7 Isolate and ITS region of the 5.8S rRNA gene was amplified using PCR. PCR products was sequenced and compared with the sequence of this region in the DNA of S. boulardii available in GenBank (NCBI) using the program BLASTn. Results revealed, this isolate was almost genetically identical (99%) with S. boulardii standard strains.
The problem of the current research addressed the close link between the psychological stress and social isolation as behavior and experience, as well as, the stress of the displaced pupils by the sense of alienation and isolation from the society to which they had moved. It reflects a sense of mystery to the displaced pupils about their lives in the present and future. Therefore, the current research aims to identify the psychological presence and the level of social isolation among secondary school displaced pupils and identify whether there were statistically significant differences in the variables between the displaced pupils (males-females). Moreover, it attempts to identify the relationship between psychological stress and social
... Show MoreAbstract:
In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach
... Show MoreThe study discussed here deals with the isolation of Aspergillus niger from palm dates, the formal and the most famous fruit in Iraq, to test and qualify this fungus isolate for its ability to produce citric acid. Submerged fermentation technique was used in the fermentation process. A.niger isolated from “Zahdi” Palme dates was used in the study of the fermentation kinetics to get the production efficiency of citric acid. Kinetics of CA production via fermentation by A. niger S11 was evaluated within 432 h fermentation time and under submerged conditions of 11% (w/v) sucrose, 5% (v/v) inoculum size, pH 4, 30 °C and 150 rpm. The maximum citric acid produced was (37.116 g/l). Kine
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the roads in all the sections of the country. Arabic vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the proposed system consists of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny edge detection
... Show MoreABSTRACT— In primary teeth, root canal treatment is a time consuming and challenging procedure, particularly during the most important step in endodontic treatment which is the preparation of the canal. Pulpectomy is the treatment of choice in all the necrotic primary teeth. For better treatment protocol, advancing technology brought the rotary system to reduce the manual dexterity and improve the quality of treatment for pulpectomy. This study aimed to compare and assess the efficacy of cleaning and the time required for the instrumentation during the preparation of root canals of the primary molars using the rotary and the manual (conventional) systems. Thirty root canals of primary teeth were selected. These teeth submitted to a
... Show More