Abstract Twenty Bacillus isolated were obtained from different sample food and water. Bacillus B1 isolated was the highest asparaginase producer, it was identified as a strain of B. subtilis. The highest production of asparaginase was observed when mineral salt medium containing 0.3% asparagen, pH 8 and incubated at 40°c for 24 hrs. B. subtilis B1 cells were immobilized by entrapment methods (calcium alginate and agar), and by adsorption on solid surface such as sawdust and cotton. The result showed that the immobilized cells by adsorption on sawdust was the best, the immobilized cell retained 88% of asparginase activity after 48h while free cell retained 65%. Cells immobilized by adsorption on sawdust was incubated at different temperatures (37-60)°c for 12 min. and at different pH (4- 10) for 120 min. the result showed that the immobilized cell had 78% remaining activity at 37c while the free cells were 58%, and retaining activity was 70% at pH=7 while free cells were 52%.
We have focused the research problem through an assessment of the applicability of the third pillar of the decisions of the Basel Committee 11 (market discipline) or not and its impact on both the adequacy of bank capital, supervisory oversight and banking risks and the statement weaknesses commitment banking institutions and which in turn lead to the stability of the financial system as a whole. .
The research is important statement on the importance of big capital in the banking business and the attributes of a role in the absorption of losses suffered by the bank, which reflects the willin
The aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
Even though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t
... Show MoreA new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
A new approach for baud time (or baud rate) estimation of a random binary signal is presented. This approach utilizes the spectrum of the signal after nonlinear processing in a way that the estimation error can be reduced by simply increasing the number of the processed samples instead of increasing the sampling rate. The spectrum of the new signal is shown to give an accurate estimate about the baud time when there is no apriory information or any restricting preassumptions. The performance of the estimator for random binary square waves perturbed by white Gaussian noise and ISI is evaluated and compared with that of the conventional estimator of the zero crossing detector.
In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.
This paper demonstrates a new technique based on a combined form of the new transform method with homotopy perturbation method to find the suitable accurate solution of autonomous Equations with initial condition. This technique is called the transform homotopy perturbation method (THPM). It can be used to solve the problems without resorting to the frequency domain.The implementation of the suggested method demonstrates the usefulness in finding exact solution for linear and nonlinear problems. The practical results show the efficiency and reliability of technique and easier implemented than HPM in finding exact solutions.Finally, all algorithms in this paper implemented in MATLAB version 7.12.
Samples of tea leaves (Green tea, Gugarate tea and Black tea used commonly in Iraq) are dried, grinded, pressed and submitted for the elemental analysis by x-ray fluorescence technique (XRF). The concentrations of major, minor and trace elements are determined. The major elements were Na, Mg, Al, K, Si, Ca, Mn, Fe, S and P. Of these elements, Ca, concentration in Gugarate tea leaves is three times, it's level in the other types of tea. Titanium, Cl, Rb and Sr are found as minor elements, while other elements such as Cu, Zn, V, Cr, Co, ...etc are found as trace elements. Of these trace elements considerable concentration values are found for some toxic elements Hg, Cd, Pb and As. Green tea contains 1.1 ppm Hg and 4.4 ppm Pb. Gugarate tea
... Show More