Fifteen local isolates of Pseudomonas were obtained from several sources such as soil, water and some high-fat foods (Meat, olives, coconuts, etc.). The ability of isolates to produce lipase was measured by the size of clear zone on Tween 20 solid medium and by measuring the enzymatic activity and specific activity. Isolate M3 (as named in this study) was found to be the most efficient for the production of the lipase with enzymatic activity reached 56.6 U/ml and specific activity of 305.94 U/mg. This isolate was identified through genetic analysis of the 16S rRNA gene. and it was shown that the isolate M3 belongs to Pseudomonas aeruginosa with 99% similarity. The DNA of isolate M3 was extracted and lipase gene was amplified through PCR technique, then purified and cloned into E.coli DH5α cells first using pTG19-T plasmid, and expressed in E.coli Bl21 with expression vector pet-28a. The activity of lipase from transformed E.coli Bl21 was 196.6 U/ml and the specific activity 618.2 U/mg.
This paper includes a comparison between denoising techniques by using statistical approach, principal component analysis with local pixel grouping (PCA-LPG), this procedure is iterated second time to further improve the denoising performance, and other enhancement filters were used. Like adaptive Wiener low pass-filter to a grayscale image that has been degraded by constant power additive noise, based on statistics estimated from a local neighborhood of each pixel. Performs Median filter of the input noisy image, each output pixel contains the Median value in the M-by-N neighborhood around the corresponding pixel in the input image, Gaussian low pass-filter and Order-statistic filter also be used.
Experimental results shows LPG-
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreBackground: Skull secondary tumors are malignant bone tumors which are increasing in incidence.Objective: The objectives of this study were to present clinical features , asses the outcome of patients with secondary skull tumors ,characterize the MRI features, locations, and extent of secondary skull tumors to determine the frequency of the symptomatic disease.Type of the study: This is a prospective study.Methods: This is a prospective study from February 2000 to February 2008. The patients were selected from five neurosurgical centers and one oncology hospital in Baghdad/Iraq. The inclusion criteria were MRI study of the head(either as an initial radiological study or following head CT scan when secondary brain tumor is suspected , vis
... Show MoreThe aim of this study is to shed light on the importance of biofuels as an alternative to conventional energy, in addition to the importance of preserving agricultural crops, which are the main source of this fuel, to maintain food security, especially in developing countries. The increase in global oil prices, in addition to the fear of global warming, are among the main factors that draw the world’s attention to searching for alternative sources of traditional energy, which are sustainable on the one hand, and on the other hand reduce carbon emissions. Therefore, the volume of global investment in renewable energy in general, and in liquid biofuels and biomass in particular, has increased. Global fears emerged that the excessive
... Show MoreNaber and toning in the modern Arab poetry Mahmoud Darwish, a model
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreThe growing use of tele
This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe
... Show MoreFilm and literature exchanges it’s influences since the early beginning of the motion pictures appearance .it was a phenomenon in other genres such as theatre ,short stories and novels .the film used out of this interaction with literature the content , themes and subjects whish were more attached to the society. based on that , the film gains it’s successes and wide spread of influences on it’s audiences who became more familiar with the motion picture style.Astrok , the French film critic wrote about “Camera the pain “ and called it as the a way of writing in the future .he was talking about the future’s role of the film .It is the importance of the film in the creation and documenting the life and its various fields.Becaus
... Show More