Organofluorines, as a pollutant, belongs to a group of substances which are very difficult to neutralize. They are part of many products of everyday use and for this reason they pollute the environment in large quantities. Perfluorinated carboxylic acids are entered into the list of the “Stockholm Convention on Persistent Organic Pollutants” in order to minimize the load on the environment by significantly reducing their use, up to their complete rejection. The DD4 strain was isolated from the soil by the enrichment method and identified using 16S rRNA method as Pseudomonas plecoglossicida. It is able to metabolize perfluorooctanoic acid (PFOA) as the only carbon source in Raymond nutrient medium with a concentration of 1000 mg/l with the release of 132 mg/l fluorine ions. In tests conducted on the biological decomposition of perfluorooctanoic acid, it was possible to quantify its residues using tandem LCMS-IT-TOF. The presented results characterize the Pseudomonas plecoglossicida DD4 strain actively utilized PFOA as the sole carbon source, which characterizes it as a candidate for the creation of biological products aimed at the utilization of organofluorine pollutants.
The article analyzes the ideological and genre features of L. Ulitskaya's work "The Plague, or OOI in the City", examines the features of building an artistic whole, ways of creating images of characters and their characteristics, stylistic features of the work.
The aim of this research is to construct a three-dimensional maritime transport model to transport nonhomogeneous goods (k) and different transport modes (v) from their sources (i) to their destinations (j), while limiting the optimum quantities v ijk x to be transported at the lowest possible cost v ijk c and time v ijk t using the heuristic algorithm, Transport problems have been widely studied in computer science and process research and are one of the main problems of transport problems that are usually used to reduce the cost or times of transport of goods with a number of sources and a number of destinations and by means of transport to meet the conditions of supply and demand. Transport models are a key tool in logistics an
... Show MoreIn the course of generating a library of open-chain epothilones, we discovered a new class of small molecule anticancer agents that has no effect on tubulin but instead kills selected cancer cell lines by harnessing reactive oxygen species in an iron-dependent manner.
Steady conjugate natural convection heat transfers in a two-dimensional enclosure filled with fluid saturated porous medium is studied numerically. The two vertical boundaries of the enclosure are kept isothermally at same temperature, the horizontal upper wall is adiabatic, and the horizontal lower wall is partially heated. The Darcy extended Brinkman Forcheimer model is used as the momentum equation and Ansys Fluent software is utilized to solve the governing equations. Rayleigh number (1.38 ≤ Ra ≤ 2.32), Darcy number (3.9 * 10-8), the ratio of conjugate wall thickness to its height (0.025 ≤ W ≤ 0.1), heater length to the bottom wall ratio (1/4 ≤ ≤ 3/4) and inclination angle (0°, 30° and 60°) are the main consid
... Show MoreIn this research constructed N2 laser system by use developed method of electric discharge. In this method used four step of electric discharge by using four capacitors, three spark gaps, high tension power supply varying in range from 12kV to 24 kV and three resistors, this method called three stage blumlein circuit. The breakdown time delay of these parallel spark gaps cement strong ultraviolet preionization in the laser channel, thus the result of these amendments the laser output is many doubled and is more increasing than that obtained using the one and two stage blumlein circuits. This system has been designed and operated to give pulse laser with wavelength at 337.1 nm. This laser system can operate without mirrors and optical res
... Show MoreInformation security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe proposal of nonlinear models is one of the most important methods in time series analysis, which has a wide potential for predicting various phenomena, including physical, engineering and economic, by studying the characteristics of random disturbances in order to arrive at accurate predictions.
In this, the autoregressive model with exogenous variable was built using a threshold as the first method, using two proposed approaches that were used to determine the best cutting point of [the predictability forward (forecasting) and the predictability in the time series (prediction), through the threshold point indicator]. B-J seasonal models are used as a second method based on the principle of the two proposed approaches in dete
... Show More