The study included the collection of samples of raw cow milk to isolate Leuconostoc bacteria, samples were sub cultured on De-Man Rogosa Sharpe-Vancomycin medium, the pure colonies were selected and subjected to the cultural and microscopically tests, according to that 25 cocci bacterial isolates were obtained, then isolates were subjected to biochemical tests. Result of tests showed that 12 isolates belong to the genus Leuconostoc out of 25 cocci bacterial isolates, Vitek2 system was used as a supplementary step. Results of final identification showed that 3 sub species were obtained included Leuconostoc mesenteroides ssp. cremoris 9 out of 12 isolates, while it was 2 isolates of Leuconostoc mesenteroides ssp. mesenteroides and one isol
... Show MoreToxicity with advanced glycation end products (AGEs) is a major problem in uremic patients. Treatment with peritoneal dialysis (PD) exacerbates AGE formation as a result of bioincompatibility of the conventional peritoneal dialysis fluid (PDF). The presence of glucose degradation products (GDPs) in PDF is the main cause of its bioincompatibility. Carnosine is an endogenous dipeptide with a powerful antiglycation/antioxidant activity. In an attempt to improve PDF biocompatibility, we evaluated the effect of carnosine in human peritoneal mesothelial cells (HPMC) incubated with PDF or GDPs in vitro. Methods: HPMC were incubated for short or prolonged time with PDF in the presence or absence of carnosine. Similarly, HPMC were incubated in the s
... Show MoreThis study relates to synthesis of bentonite-supported iron/copper nanoparticles through the biosynthesis method using eucalyptus plant leaf extract, which were then named E-Fe/Cu@B-NPs. The synthesised E-Fe/Cu@B-NPs were examined by a set of experiments involving a heterogeneous Fenton-like process that removed direct blue 15 (DB15) dye from wastewater. The resultant E-Fe/Cu@B-NPs were characterised by scanning electron microscopy, Brunauer–Emmet–Teller analysis, zeta potential analysis, Fourier transform infrared spectroscopy and atomic force microscopy. The operating parameters in batch experiments were optimised using Box–Behnken design. These parameters were pH, hydrogen peroxide (H2O2
... Show MoreIn this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show More