The highest activities for biosurfactant production were achieved with isolates В. subtilis TM17, isolated from rhizosphere of tomates and В. subtilis CC5, isolated from rhizosphere of cucumber. The maximum amount of biosurfactant precipitated and partially purified from supernatant was 400 mg/l at the end of Bacillus strains growth on starch and no more than 300 mg/l on glucose. Replacement of glucose by hexadecane resulted in increase of the content of biosurfactant preparation extracted from supernatant up to 700 mg/l. The results of the experiments on hydrophilic substrates have shown that the content of crude preparation extracted from the native liquid culture is 1000 mg/l.\nThus, strains growing on hexadecane synthesize mainly extracellular, and the ones growing on glucose both extracellular and intracellular.\nCritical micelle concentration for the biosurfactants of selected strains on the average was 25-30 mg/l at constant surface tension 26-30 mN/m.
An integration testing methodology based on graph theoretical strategy reinforced with truth maintenance system is suggested to be incorporated into present DevOps tools of cloud computing environment. While the tools incorporated in today’s cloud environment are effective and efficient in terms of syntactic perspectives on integration and testing of the software modules developed in cloud environment, we are still waiting for the tools that maintain the correctness of the total software when there happen changes in the functionality and specifications of the system. Our methodology provides the mechanism that reflects the semantic changes of the target software by incorporating graph theoretical method and truth maintenance system adopted from research area of artificial intelligence.
High content of nitrogen and phosphorus, mixed solid and liquid, high organic matter and maladjustment of carbon and nitrogen ratio were produced in large-scale pig wastewater. The simulated wastewater of methyl violet 2B dye was used as the treatment object for the starch based compound flocculant. The real-time monitoring of flocculation process was carried out by iPDA, and the measurement of R value, Zeta potential, CODCr and chromaticity was carried out. In order to overcome the disadvantages of the traditional Fenton method, the load type catalyst (Cu/Fe3O4-AC) was prepared and characterized by precipitation method. The synergistic bactericidal effect of Cu/Fe3O4-AC and H2O2 were benefit for pig waste water innocuous treatment. These technologies can greatly reduce the discharge of waste and reduce the pollution of the pig industry to the environment.
This research discusses the advantages and disadvantages of free trade between Taiwan and Mainland China. Inductive analysis is made through economic model to understand the influence of service trade between mainland China and Taiwan on the overall economy of Taiwan. The analysis models include Simple Keynesian 45o line model, IS-LM mode, AD-AS model, classic production function and labor market etc.\nFrom the research result of service trade between mainland China and Taiwan, it can be known that the income, interest rate, price, employment and salary in Taiwan will increase significantly.\nFinally, it is suggested that the government should: 1) pass the service trade agreement between mainland China and Taiwan; 2) give assistance to the service trade practitioners in the short term; 3) strictly control the problems such as food security, tourism and public security, and the service trade practitioners in Taiwan are suggested to: 1) get rid of the old products and introduce new ones; 2) cooperate with the practitioners in mainland China; 3) reduce the price of commodities with great elastic demand for sales; 4) strengthen the promotion of products with high margin profit rate.
As we know that the cloud computing can saves the information in open environment, so the safety has come to be the major issue. This article describes the issues of Web API’s with respect to security in cloud computing which is an emerging problem. We have proposed solution to protect Web APIs which is described in Methodology section. API security is becoming critical now days. There are lots of problems that were faced on daily basics such as in browser many issues occur. For Instance, Firefox scan the variables of the program by calling the program through javascript which may comprise by leaking your privacy information about your web mail usage and browser habits. Indeed, the most usual failure mode of API is the transactions which might be relaxed in isolation end up insecure in combination, whether or not because of characteristics interaction, syntax of application, and gradual leakage of information and concurrency issues [12].