This study aimed to extract, purify, and characterize the protease of local Okra Abelmoschus esculentus pods. The extraction process was conducted using ten extraction solutions with different pH and ionic strength values. Phosphate buffer solution with (pH 7, 0.05M, containing 2% sodium chloride) gave the highest activity which was (7.2 Unit/ml) as compared to other solutions, which ranged from 0.8-5.9 Unit/ml. The extracted enzyme purified by several stages. Being, precipitation by gradual addition of Ammonium sulphate from 20 to 85% saturation, then the precipitated enzyme was dialyzed and fractionated through DEAE-Cellulose (22X1.1cm), the enzymic fractions were pooled. The specific activity, purification fold and the enzyme yield values were 21.52 units/mg, 1.24 and 82.83% respectively. For further purification the enzyme fractions applied to G-75 Sephadex column (65x 1.5cm), the specific activity, enzyme yield and purification fold value were 98.82Unit/mg, 46.70%, 5.1, respectively .Electrophoresis analysis in the absence of SDS showed single band as indicator for enzyme purity. In conclusion, Okra pods could be one of natural source for proteases and this study recommended further studies regarding the adequate means for removal of the mucilage in order to increase the extraction efficiency.
This paper aims to build a modern vision for Islamic banks to ensure sustainability and growth, as well it aims to highlight the positive Iraqi steps in the Islamic banking sector. In order to build this vision, several scientific research approaches were adopted (quantitative, descriptive analytical, descriptive). As for the research community, it was for all the Iraqi private commercial banks, including Islamic banks. The research samples varied according to a diversity of the methods and the data availability. A questionnaire was constructed and conducted, measuring internal and external honesty. 50 questionnaires were distributed to Iraqi academic specialized in Islamic banking. All distributed forms were subject to a thorough analys
... Show MoreThis study aimed to reveal the extent to which the values of social peace are included in the content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia. To achieve this goal, the researcher used the descriptive analytical approach. The study sample consisted of all developed social and national studies textbooks of the middle stage in kingdom of Saudi Arabia in first and second semester of student books in edition of 1439-1440. The study tool was the analysis card. The study reached the following results: 1-The content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia as a whole included (38) social peace values of total (40) values, corresponding to the inclusio
... Show MoreMany studies have recommended implying the skills and strategies of creative thinking, critical thinking, and reflective thinking in EFLT curriculum to overcome EFL teaching-learning process difficulties. It is really necessary to make EFL teachers aware of the importance of cultural thinking and have a high perception of its forces. Culture of thinking consists of eight cultural forces in every learning situation; it helps to shape the group's cultural dynamic. These forces are expectations, language, time, modeling, opportunities, routines, interactions, and environment. This study aims to investigate EFL student-teachers’ perceptions of cultural thinking. The participants are selected randomly from the fourth-stage students at the D
... Show MoreThis research presents a new algorithm for classification the
shadow and water bodies for high-resolution satellite images (4-
meter) of Baghdad city, have been modulated the equations of the
color space components C1-C2-C3. Have been using the color space
component C3 (blue) for discriminating the shadow, and has been
used C1 (red) to detect the water bodies (river). The new technique
was successfully tested on many images of the Google earth and
Ikonos. Experimental results show that this algorithm effective to
detect all the types of the shadows with color, and also detects the
water bodies in another color. The benefit of this new technique to
discriminate between the shadows and water in fast Matlab pro
Democracy in any country is measured by the cultural, social and economic level reached by women in it in general and women with disabilities in particular, and the extent of their participation in political life and political decision-making. As a result of the patriarchal power that societies have known, including Iraq, history has witnessed multiple types and forms of discrimination against women, which differed from one country to another, this matter has pushed women and since the beginning of the last century the issue of women's rights has been raised at the global, regional and national levels, through holding international conferences and agreements In order to empower women in all social, economic and political fields.
... Show MoreGranulation Technique for Gamma Alumina Catalyst Support was employed in inclined disk granulator (IDG), rotary drum granulator (RD) and extrusion – spheronization equipments .Product with wide size range can be produced with only few parameters like rpm of equipment, ratio of binder and angle of inclination. The investigation was conducted for determination the optimum operating conditions in the three above different granulation equipments.
Results reveal that the optimum operating conditions to get maximum granulation occurred at ( speed: 31rpm , Inclination:420 , binder ratio:225,300% ) for the IDG,( speed: 68rpm , Inclination: 12.50 , binder ratio: 300% ) for the RD and ( speed:1200rpm , time of rotation: 1-2min )for the Caleva
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ rates
... Show MoreThe study presents the test results of Completely Decomposed Granite (CDG) soil tested under drained triaxial compression, direct shear and simple shear tests. Special attention was focused on the modification of the upper halve of conventional Direct Shear Test (DST) to behave as free
head in movement along with vertical strain control during shear stage by using Geotechnical Digital System (GDS). The results show that Free Direct Shear Test (FDST) has clear effect on the measured shear stress and vertical strain during the test. It has been found that shear strength
parameters measured from FDST were closer to those measured from simple shear and drained triaxial compression test. This study also provides an independent check on
This paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show More