Five Saccharomyces cerevisiae isolated from the ability of chitinase production from the isolates were studied. Quantitative screening appeared that Saccharomyces cerevisiae S4 was the highest chitinase producer specific activity 1.9 unit/mg protein. The yeast was culture in liquid and solid state fermentation media (SSF). Different plant obstanases were used for (SSF) with the chitine, while liquid media contained chitine with the diffrented nitrogen source. The favorable condition for chitinase producers were incubated at 30 ºC at pH 6 and 1% colloidal chitine.
Petroleum is one of the most important substances consumed by man at present times, a major energy source in this century, petroleum oils can cause environmental pollution during various stages of production, transportation, refining and use, petroleum hydrocarbons pollutions ranging from soil, ground water to marine environment, become an inevitable problem in the modern life, current study focused on bioremediation process of hydrocarbons contaminants that remaining in the bottom of gas cylinders and discharged to the soil. Twenty-four bacterial isolates were isolated from contaminated soils all of them gram negative bacteria, bacterial isolates screening to investigate the ability of biodegradation of hydrocarbons, these isolates inocula
... Show More
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThis research depends on the relationship between the reflected spectrum, the nature of each target, area and the percentage of its presence with other targets in the unity of the target area. The changes occur in Land cover have been detected for different years using satellite images based on the Modified Spectral Angle Mapper (MSAM) processing, where Landsat satellite images are utilized using two software programming (MATLAB 7.11 and ERDAS imagine 2014). The proposed supervised classification method (MSAM) using a MATLAB program with supervised classification method (Maximum likelihood Classifier) by ERDAS imagine have been used to get farthest precise results and detect environmental changes for periods. Despite using two classificatio
... Show MoreIn order to scrutinize the impact of the decoration of Sc upon the sensing performance of an XN nanotube (X = Al or Ga, and XNNT) in detecting sarin (SN), the density functionals M06-2X, τ-HCTHhyb, and B3LYP were utilized. The interaction of the pristine XNNT with SN was a physical adsorption with the sensing response (SR) of approximately 5.4. Decoration of the Sc metal into the surface of the AlN and GaN led to an increase in the adsorption energy of SN from −3.4 to −18.9, and −3.8 to −20.1 kcal/mol, respectively. Also, there was a significant increase in the corresponding SR to 38.0 and 100.5, the sensitivity of metal decorated XNNT (metal@XNNT) is increased. So, we found that Sc-decorating more increases the sensitivity of GaNN
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More