RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2
Proteus mirabilis ? -lactamase of local isolates number 4TF represent karkh side and 20TF represent rusafa side of Baghdad were extracted and purified 23.17, 25.23 fold with yield of 36.66 %, 37.5% and specific activity 11.8, 12.6 of unit/ mg protein by DEAE –cellulose and Sepharose 4B (respectively ).Molecular weight of both enzyme was about 35500 Dalton determined by gel filtration. The study indicated that the isoelectric point of purified ? -lactamase that extracted from isolate number 4TF and 20TF was 5.4.
An experiment was conducted in a greenhouse - research station B - College of Agricultural Engineering Sciences, University of Baghdad, during the fall season of 2018 with the aim of propagating and initially studying the field performance of 18 and 20 potential potato lines derived from Rivera and Arizona cv. after in vitro exposure of nodal segments to different dosages of gamma rays (0, 10, 20, and 30 Gray) and EMS (0, 10, 20, and 30 mM). Each control cultivar and their derived lines were independently cultured in plastic bags according to the RCBD, with three replications. The results showed that the highest plant height and number of leaves were obtained from Arizona derived lines which gave 60.11 cm and 25.30 leaves.plant-1 in
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreFurfural is a toxic aromatic aldehyde that can cause a severe environmental problem especially the wastewater drown from petroleum refinery units. In the present work, a useless by-product from local furniture manufacturing industry; sawdust was used as raw material for the preparation of activated carbon which is chemically activated with phosphoric acid. The effect of adsorption variables which include initial pH of solution (2-9), agitation speed (50-250) rpm, agitation time (15-120) min, initial concentration of furfural (50-250) ppm, and amount of adsorbent material (0.5-2.5) g for the three adsorbents used (prepared activated carbon, commercial activated carbon and raw sawdust) were investigated in a batch process
... Show MoreA calamitic symmetric liquid crystalline consisting of an azo group containing 5H-Thiazolo[3,4-b][1,3,4]thiadiazole moiety compound[III] was synthesized via sequence reactions starting from reaction terephthaldehyde with mercaptoacetic acid and thiosemicarbazide in the presence of concentrated sulfuric acid to synthesized 5,5'-(1,4-phenylene)bis(5Hthiazolo[4,3-b][1,3,4]thiadiazol-2-amine)[I] then the azo compound [II] synthesized by coupling between diazonium salt of the compound [I] with phenol at (0-4) ̊C., after that the compound [III] was synthesized by the reaction of the compound [II] with methyl bromide in alkaline media. The compounds are characterized by melting points, FTIR and 1HNMR spectroscopy. The mesomorphic behavior was stu
... Show MorePrediction of the formation of pore and fracture pressure before constructing a drilling wells program are a crucial since it helps to prevent several drilling operations issues including lost circulation, kick, pipe sticking, blowout, and other issues. IP (Interactive Petrophysics) software is used to calculate and measure pore and fracture pressure. Eaton method, Matthews and Kelly, Modified Eaton, and Barker and Wood equations are used to calculate fracture pressure, whereas only Eaton method is used to measure pore pressure. These approaches are based on log data obtained from six wells, three from the north dome; BUCN-52, BUCN-51, BUCN-43 and the other from the south dome; BUCS-49, BUCS-48, BUCS-47. Along with the overburden pressur
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreRap songs often feature artists who utilize explicit language to convey feelings such as happiness, sorrow, and anger, reflecting audience expectations and trends within the music industry. This study intends to conduct a socio-pragmatic analysis of explicit, derogatory, and offensive language in the songs of the American artist Doja Cat, employing Hughes’ (1996) Swearing Word Theory, Jay’s (1996) Taboo Words Theory, Luhr’s (2002) classification of social factors for sociolinguistic examination, Salager’s (1997) categories of hedges for pragmatic assessment, and Austin’s (1965, 1989) theory of speech acts. The researchers collected the data using the AntConc corpus analysis tool. The data shows the singer’s frequent use
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More