Three Saccharomyces cerevisiae isolates from different sources (China, Turkey and Egypt) were screened by culturing on solid state fermentation to select the most efficient isolate for invertase production. S. cerevisiae from China was high specific activity 34.7 U/mg. The optimum conditions for enzyme production from this isolate were determined by using a medium composed of wheat bran moisten with 1:0.5 (v:w) corn steep liquor as nitrogen source at initial pH 5.0 for 5 days at 30OC.
This paper investigate a sensorless speed control of a separately excited dc motor fed from a buck type dc-dc converter. The control system is designed in digital technique by using a two dimension look-up table. The performance of the drive system was evaluated by digital simulation using Simulink toolbox of Matlab.
Psychological research centers help indirectly contact professionals from the fields of human life, job environment, family life, and psychological infrastructure for psychiatric patients. This research aims to detect job apathy patterns from the behavior of employee groups in the University of Baghdad and the Iraqi Ministry of Higher Education and Scientific Research. This investigation presents an approach using data mining techniques to acquire new knowledge and differs from statistical studies in terms of supporting the researchers’ evolving needs. These techniques manipulate redundant or irrelevant attributes to discover interesting patterns. The principal issue identifies several important and affective questions taken from
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreThis paper is carried out to detect the subsurface structures that have geological
and economical importance by interpreting the available reflection seismic data of
an area estimated to be about (740) km2. The Khashim Al-Ahmer structure is partial
of series structures of (Injana – Khashim Al-Ahmer – Mannsorya) from the (NW to
the SE), it is located within for deep faulted area. The component of the one
elongated dome of asymmetrical of structure which has(SW) limb more steeper than
the (NE) limb.Twenty three seismic sections had been interpreted for two seismic
surveys and the total length of all seismic lines is about (414.7) Km. Interpretation
of seismic data was focused on two reflectors (Fatha and Jeribi)
Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show MoreSorption is a key factor in removal of organic and inorganic contaminants from their aqueous solutions. In this study, we investigated the removal of Xylenol Orange tetrasodium salt (XOTS) from its aqueous solution by Bauxite (BXT) and cationic surfactant hexadecyltrimethyl ammonium bromide modified Bauxite (BXT-HDTMA) in batch experiments. The BXT and BXT-HDTMA were characterized using FTIR, and SEM techniques. Adsorption studies were performed at various parameters i.e. temperature, contact time, adsorbent weight, and pH. The modified BXT showed better maximum removal efficiency (98.6% at pH = 9.03) compared to natural Bauxite (75% at pH 2.27), suggesting that BXT-HDTMA is an excellent adsorbent for the removal of XOTS from water. The equ
... Show More