Been Antkhav three isolates of soil classified as follows: Bacillus G3 consists of spores, G12, G27 led Pal NTG treatment to kill part of the cells of the three isolates varying degrees treatment also led to mutations urged resistance to streptomycin and rifampicin and double mutations
The mutagenic effect of some crucifers widely consumed Lepiduim sativum (Garden cress) and Arugula (Eruca sativa) was studied in comparison to carrot (Daucus carota), using bacterial mutagenic system composed of three bacterial isolates; (Bacillus spp)G3 (Arthrobacter spp)G12, and (Brevibacterium spp)G27 ,. Treatment of isolates with plant extracts led to reduction in survival fraction (Sx)at different levels except that Aurgula extract did not show any inhibitory effect in isolates G12 and G27. Crucifers extracts induced streptomycin resistant mutants in G12 at higher level than G3 , but not in G27. No resistance to rifimpacin was detected in all isolates.
The study aimed to recommend a new spectrophotometric-kinetic method for determination of carbamazepine (CABZ) in its pure form and pharmaceutical forms. The proposed procedure based on the coupling of CABZ with diazotized sulfanilic acid in basic medium to yield a colored azo dye. Factors affecting the reaction yield were studied and the conditions were optimized. The colored product was followed spectrophotometrically via monitoring its absorbance at 396 nm. Under the optimized conditions, two method (the initial rate and fixed time (10 minute)) were applied for constructing the calibration graphs. The graphs were linear in concentration ranges 2.0 to 18.0 µg.mL-1 for both methods. The proposed was applied successfully in
... Show MoreThe design of future will still be the most confusing and puzzling issue and misgivings that arouse worry and leading to the spirit of adventures to make progress and arrive at the ways of reviving, creativity and modernism. The idea of prevailing of a certain culture or certain product in design depends on the given and available techniques, due to the fact that the computer and their artistic techniques become very important and vital to reinforce the image in the design. Thus, it is very necessary to link between these techniques and suitable way to reform the mentality by which the design will be reformed, from what has been said, (there has no utilization for the whole modern and available graphic techniques in the design proce
... Show MoreGlobally, Sustainability is very quickly becoming a fundamental requirement of the construction industry as it delivers its projects; whether buildings or infrastructures. Throughout more than two decades, many modeling schemes, evaluation tools, and rating systems have been introduced en route to realizing sustainable construction. Many of these, however, lack consensus on evaluation criteria, a robust scientific model that captures the logic behind their sustainability performance evaluation, and therefore experience discrepancies between rated results and actual performance. Moreover, very few of the evaluation tools available satisfactorily address infrastructure projects. The res
The present work establishes and validates HILIC strategies simple, accurate, exact and precise in pure form and inpharmaceutical dosage for separating and determining theophylline. These methods are developed on HILIC theophyllineseparation in columns ZIC2 and ZIC3. The eluent was prepared by mixing buffer (20% sodium acetate-40 mM, pH 5.5), 80%acetonitrile. The flow rate is 0.8 mL/min, with gradient elution and UV detection at 270 nm. In the ZIC2 and ZIC3 columns oftheophylline determining, the concentration range was 0.01-4μg.ml-1. The lower limit of detection and quantification fortheophylline were determined as 0.130, 0.190 μg.ml-1 and accuracy were 99.70%, 99.58% on ZIC2 and ZIC3, respectively. TheHILIC methods developed and validat
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny Edge detection algo
... Show MoreIn recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny
... Show More