Skip to content

Volume 12, Issue 02


1) Evaluating the Possibility of Using Polyhydroxyalkanoate Aquatic Byproducts of Microbial Strains Isolated From the Sea Of Vietnam
Author’s Details: Nguyễn Thị Đà1, Nguyễn Thu An2, Vũ Thị Thu Huyền3, Nguyễn Mai Anh3, Vũ Thị Quyên3, Nguyễn Trọng Linh1, Nguyễn Thu Trang1, Trần Mạnh Hải1, Lê Thị Hồng Minh*3, Lã Thị Huyền*1 

  1. Institute of Biotechnology (IBT) of the Vietnam Academy of Science and Technology (VAST) – No. 18 Hoang Quoc Viet, Nghia Do, Cau Giay, Hanoi
  2. Newton Grammar School
  3. Institute of Marine Biochemistry (IMBC) of the Vietnam Academy of Science and Technology (VAST) – No. 18 Hoang Quoc Viet, Nghia Do, Cau Giay, Hanoi
    *Coresponding author:,
    Co-authors Nguyen Thi Da and Nguyen Thu An share equal responsibility and accountability for this article.

As plastic waste is currently an exponentially urgent issue, the usage of bioplastics to replace synthetic plastics would help to resolve the existing pollution. In addition to providing the nutrients and minerals required for the culture medium, the waste sources and byproducts of the seafood processing industry also include a wide variety of nutrients. The fat produced during the processing of the byproducts would also be a viable, affordable supply of carbon for microbial strains that can make bioplastics in the water. Particularly in this study, 191 strains were selected for growth and use of aquatic byproducts from marine habitats. The fluorescence microscopy analysis of these strains’ capacity to collect PHA revealed that 35 of the strains treated with Nile blue A displayed bright orange hue. The three strains GB300, GB505, and GB515 with the best density and accumulated plastic particle size were gathered using transmission electron microscopy pictures. These three strains are known to belong to three genera based on morphological traits, culture traits, and 16S rRNA gene sequences: two genera are actinomyces (Marmoricola sp. and Piscicocus sp.), and one strain belongs to the genus Labrenzia. Three marine microbial strains’ 16S rRNA gene sequences were stored in the Genbank under the accession numbers MN519525, MN519529, and MN525591, respectively corresponding to GB505, GB300, and GB515.
Keywords:Bioplastics, PHA, PHB, Aquatic Organism, Actinomyces.
[Download Full Paper] [Page 01-12]

2) Navigating the Complex Landscape of Network Security: A Comprehensive Analysis of Protocols, Tools, and Threats
Author’s Details: Muhammad Junaid Iqbal1, Shan Afzal2, Muhammad Furqan Rafique3, Muhammad Asaf4 , Yawar Ahmed5
1,4.5Department of Computer science, Lahore Leads University, Lahore, 54000, Pakistan

2Department of Computer science, Government College University Faisalabad, Faisalabad, 38000, Pakistan
3Department of Computer science, University of Agriculture, Faisalabad, 38000, Pakistan
*Corresponding Author: junaid iqbal)
The importance of network security has grown significantly in recent years. With the widespread use of the Internet, consumers, companies, and military clients have become increasingly vulnerable to security threats such as hacking, malware, and phishing attacks. Therefore, security has become a top priority for many organizations. Over time, the evolution of security technology has led to a better understanding of the field of network security. The area of community protection is vast and continuously evolving, encompassing a wide range of strategies, technologies, and protocols. The topic of observation in this article includes news from the days before the internet as well as more recent advancements in community protection. By analyzing current research techniques, previous defense strategies that were effective, and network attack techniques that have been used before, we can gain a better understanding of how to improve network security. This article’s focus is on the security of various domain names, which is explored through a bibliographic research approach.
Key Words:Network security; internet security; community protection; defense strategies; network attack techniques; domain name security; security technology; security protocols, software, hardware tools; PC network infrastructure; access rights; IT facilities; message encryption.

[Download Full Paper] [Page 13-22]