Microalgae have been used widely in bioremediation processes to degrade or adsorb toxic dyes. Here, we evaluated the decolorization efficiency of Chlorella vulgaris and Nostoc paludosum against two toxic dyes, crystal violet (CV) and malachite green (MG). Furthermore, the effect of CV and MG dyes on the metabolic profiling of the studied algae has been investigated. The data showed that C. vulgaris was most efficient in decolorization of CV and MG: the highest percentage of decolorization was 93.55% in case of MG, while CV decolorization percentage was 62.98%. N. paludosum decolorized MG dye by 77.6%, and the decolorization percentage of CV was 35.1%. Metabolic profiling of C. vulgaris and N. paludosum were performed using NMR spectroscopy. Based on 1D and 2D NMR data, 43 compounds were identified in the polar extract of C. vulgaris, while 34 polar metabolites were successfully determined in N. paludosum. The identified compounds included carbohydrates, amino acids, organic acids, dipeptides, steroids and phenols. Statistical analysis was carried out to recognize the pattern of metabolite variation between control and dye treated samples. Principal component analysis (PCA) and hierarchical cluster analysis showed that samples treated with MG are clearly separated from the control in both types of algae. Based on heat map data, the level of carbohydrates and amino acids concentrations are strongly affected by bioremediation of MG dye compared with CV dye. In conclusion, the present study proved that CV and MG dyes are considered as stress factors and the studied algae species exert their bioremediation activity without the dyes being absorbed into the cells.
حضرت معقدات كل من الفنادايل, الخارصين, النحاس والكادميوم بتكافؤهم الثنائي والذهب بتكافؤه الثلاثي بأستخدام صبغة ازوجديدة (6،4،2-ثلاثي هيدروكسي-3-((3-هيدروكسي فنيل) ثنائي زينيل ) فنيل ) ايثان-1-اون المحضرة من ملح الديازونيوم مع ٦,٤,٢- ثلاثي هيدروكسي اسيتوفينون بعد عزل (E)-1-(2,4,6-trihydroxy-3-((3-hydroxyphenyl)diazenyl)phenyl)ethan-1-one تم تشخيصها بواسطة الطرق الطيفية المتاحة والتقنيات التشخيصية لكل من التحليل الدقيق للعناصرواطياف كل من ال
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThis research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012),
... Show MoreThe use analysis value chain such information in the provision as financial so information quality meet and satisfy the needs of users such information , particularly investors and lenders as the identification needs financial information and the knowledge as their behavior influenced by that information can be based on the accounting profession to focus on improving their function in order to achieve its goal that satisfying their needs and rationalize their decisions . In accounting thought discovered fertile ground for users preferences as one of the entrances theorising positive which is based on the need to include knowledge on accounting hypothesis that explain the
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAbstract
The Issue of trade policy is one of the most important topics that researchers have been interested in because of its important role in the economy over the ages. This importance has increased due to the increasing of commercial operations at different levels in both developing and developed countries Foreign trade is one of the means of achieving economic development through the economic surpluses resulting from exports and imports, as it is an important pillar of the economy in general and the Iraqi economy in particular, in light of the transformation process that took place for the Iraqi economy in various fields due to the implement
... Show MoreThe structure of the interrogation process in cross-examinations is said to be diverse and complex in terms of question-response typology. This is because the counsel has to extract truth from an opposing party’s witness whose views are expected to advocate that party's views regarding the case. Accordingly, the study which is basically quantitative in nature aims to investigate what the examining party intends to obtain out of these questions and which of these questions are the most prevalently used. It also aims to measure the amount of cooperativity in witnesses' responses. Accordingly, three transcripts of cross-examination have been analyzed, using a pragmatically-oriented approach. The approach draws on Stenstorm (1984) and Arch
... Show MoreThe combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.
In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.
&n
... Show More