Polyaromatic hydrocarbons (PAHs) are a group of aromatic compounds that contain at least two rings. These compounds are found naturally in petroleum products and are considered the most prevalent pollutants in the environment. The lack of microorganism capable of degrading some PAHs led to their accumulation in the environment which usually causes major health problems as many of these compounds are known carcinogens. Xanthene is one of the small PAHs which has three rings. Many xanthene derivatives are useful dyes that are used for dyeing wood and cosmetic articles. However, several studies have illustrated that these compounds have toxic and carcinogenic effects. The first step of the bacterial degradation of xanthene is conducted by dioxygenase enzymes that introduces two oxygen atoms in the structure of the aromatic rings. In this study we focused on the bacterial bioremediation of xanthene via Sphingobium yanoikuyae B1DR, an engineered strain carrying the dioxin angular dioxygenase from Sphingomonas wittichii RW1. HPLC analysis of supernatant from resting cells of S. yanoikuyae B1DR grown on xanthene and succinate showed the ability of this strain to transform xanthene to 2-hydroxyphenylacetate that was not produced by the wild type of Sphingobium yanoikuyae B1. Production of 2-hydroxyphenylacetate was confirmed by GC-MS. Our results show the importance of this strain in reducing the toxic effects of xanthene in the environment and showed for the first time that ring-hydroxylation enzymes and hydrolases for biphenyl degradation in S. yanoikuyae B1 may function on metabolites generated from the degradation pathway of xanthene. By analyzing our results we were able to draw a novel pathway for xanthene degradation in S. yanoikuyae B1DR.
Most Internet of Vehicles (IoV) applications are delay-sensitive and require resources for data storage and tasks processing, which is very difficult to afford by vehicles. Such tasks are often offloaded to more powerful entities, like cloud and fog servers. Fog computing is decentralized infrastructure located between data source and cloud, supplies several benefits that make it a non-frivolous extension of the cloud. The high volume data which is generated by vehicles’ sensors and also the limited computation capabilities of vehicles have imposed several challenges on VANETs systems. Therefore, VANETs is integrated with fog computing to form a paradigm namely Vehicular Fog Computing (VFC) which provide low-latency services to mo
... Show MoreCyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix
... Show MoreMeasurement of construction performance is essential to a clear image of the present situation. This monitoring by the management team is necessary to identify locations where performance is exceptionally excellent or poor and to identify the primary reasons so that the lessons gained may be exported to the firm and its progress strengthened. This research attempts to construct an integrated mathematical model utilizing one of the recent methodologies for dealing with the fuzzy representation of experts’ knowledge and judgment considering hesitancy called spherical fuzzy analytic hierarchy process (SFAHP) method to assess the contractor’s performance per the project performance pa
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show MoreWe propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The threshold value and region of interest are discerned using operator input and Otsu algorithm. Novel brain slices image division is introduced via angular and distance span vectors of sizes 24˚ with 15 pixels. Rotation invariance of the angular span vector is determined. An automatic image categorization into normal and abnormal brain tissues is performed using Support Vector Machine (SVM). St
... Show More