Bacteriocin is an important antimicrobial peptide that can be used in industrial and medical fields due to its characteristics of antibacterial, food preservation and anticancer activities. Fifty isolates of Bacillus sp were collected from different soil samples which were already recognized via morphological and biochemical identification process. The isolates were screened for bacteriocin production effective against Staphylococcus spp in order to select the highest producing isolate. The isolate NK16 showed the maximum bacteriocin production (80 AU/ml) which was further characterized as Bacillus subtilis NK 16 through using API identification system (API 20E and API 50CHB). Then, next step was to detect the optimal conditions for maximum bacteriocin production which were found to be brain-heart infusion broth as the best production medium with pH 6, 30oCand 2% inoculum size. Bacteriocin was partially purified by precipitation with ammonium sulphate and then separation with sephadex G-150 gel filtration. The specific activity of the resulted partial purified bacteriocin was increased to 853.33 AU/mg with 38 fold purification and 24% yield. The study of bacteriocin characterization revealed that the activity of bacteriocin was stable after 10 min at 20, 30, 40oC whereas 50% of the bacteriocin activity was lost after exposure to 50oC and decreased to approximately 20 AU/ml at 60,70 and 80 Co. In addition, bacteriocin activity showed stability at pH 6 and 7 for 30 min while it was decreased by approximately 50% at pH 5 and 8, and completely inhibited at pH 4 and 9. On the other hand, the investigation of mode of action showed that bacteriocin has a bactericidal activity. Antimicrobial activity tests of the partial purified bacteriocin displayed a significant activity against most clinical Staphylococcus aureus and Staphylococcus epidermidis isolates, whereas it was less effective against Staphylococcus saprophyticus isolates.
In this review, previous studies on the synthesis and characterization of the metal Complexes with paracetamol by elemental analysis, thermal analysis, (IR, NMR and UV-Vis (spectroscopy and conductivity. In reviewing these studies, the authors found that paracetamol can be coordinated through the pair of electrons on the hydroxyl O-atom, carbonyl O-atom, and N-atom of the amide group. If the paracetamol was a monodentate ligand, it will be coordinated by one of the following atoms O-hydroxyl, O-carbonyl or N-amide. But if the paracetamol was bidentate, it is coordinated by atoms (O-carbonyl and N-amide), (O-hydroxyl and N-amide) or (O-carbonyl and O-hydroxyl). The authors also found that free paracetamol and its complexes have antimicrobial
... Show MoreThe Hbl toxin is a three-component haemolytic complex produced by Bacillus cereus sensu lato strains and implicated as a cause of diarrhoea in B. cereus food poisoning. While the structure of the HblB component of this toxin is known, the structures of the other components are unresolved. Here, we describe the expression of the recombinant HblL1 component and the elucidation of its structure to 1.36 Å. Like HblB, it is a member of the alpha-helical pore-forming toxin family. In comparison to other members of this group, it has an extended hydrophobic beta tongue region that may be involved in pore formation. Molecular docking was used to predict possible interactions between HblL1 and HblB, and suggests a head to tail dimer might f
... Show MoreThe aim of the current research is to study the effect of adding green tea to the edible film prepared from the whey protein isolate on the effectiveness of microorganisms and evaluating the of antimicrobial effectiveness of these films on Iraqi soft cheese packaging during the nine days of storage as an alternative to commercial packaging. At the beginning of the study, the minimum inhibitory concentration was measured by calculate the diameter of the zone of inhibition on growth of the bacteria and it's included the group of Gram negative bacteria (Escherichia coli, Salmonella spp, Pseudomonas Aeruginosa) and the group of Gram positive bacteria (Staphylococcus Aureus, Bacillus spp) and a yeast (Candida Albican). Where the diameter of t
... Show Moreantimicrobial solutions against Coliforms, E. coli O157: H7, yeasts and molds were evaluated by agar well diffusion method. Chitosan (CH) exhibited best antimicrobial activity against the treated microorganisms at concentration of (5%) with contact time for 6hrs at refrigeration temperature (4ÚC), zones of inhibition for (GA) and (CH) for each solution alone ranging from (0 to 10 mm), chitosan solution (CH) exhibited both antibacterial and antifungal activities, Gum Arabic washing solution showed significant antibacterial activity (P < 0.05) against the microorganisms at concentration (15%), without inhibitory effect against E. coli O157:H7 at concentration (10%), in the current study the results confirmed that (15%) (w/v) of GA and 5%
... Show MoreIt is certain that marriage has the favor of the continuity of human kind since the Prophet Adam till now. But this important event is threatened by some justifications which lead to its delay or abandonment. In the West, sexual relations, illegal friendships, and disrespect of marriage sacredness lead to this delay. While the reasons behind the delay of marriage in the Arab world refer to high dowries, women go out to work, and the religious and scientific ignorance of the need and importance of marriage. The problem also differs according to the difference between the rural and urban regions. On one hand, we find that early marriage is a necessity in the rural regions; on the other hand, the delay of marriage is a clear and nat
... Show MoreThe present study is concerned with the writer's ideologies towards violence against women. The study focuses on analyzing violence against women in English novel to see the extent the writers are being affected and influenced by their genders. It also focuses on showing to what extent the writer's ideologies are reflected in their works. Gender influences social groups ideologies; therefore, when a writer discusses an issue that concerns the other gender, they will be either subjective or objective depending on the degree of influence, i.e., gender has influenced their thoughts as well as behaviors. A single fact may be presented differently by different writers depending on the range of a
... Show MoreIn this study 100 samples were collected from infected children with acute and chronic tonsillitis who attended to Al-Yarmook Teaching Hospital (ENT consultation clinic) from 5/12/2013 to 1/3/2014. The result of laboratory culture was positive in 67 samples. Depending on their cultural, morphological and biochemical characterization of bacterial isolate of them were identified as (37.31%) belonged to Streptococcus pyogenes and the diagnosis is confirmed by the use of Remel Rapid STR System, (34.32%) belonged to S.parasanguinis, (11.94%) S.mitis, (11.94%) S.oralis and (4.47%) S.thoraltensis . Results confirmed that cup assay gave highest inhibition zone after 24 hrs compare with well diffusion methods for suspension of L.
... Show MoreThe Mannich base ligand was synthesized in an ethanol medium through a condensation reaction of 2-mercaptobenzimidazole and ciprofloxacin at room temperature. Subsequently, several metal complexes of this ligand were prepared. To characterize both the base ligand and the metal complexes, various techniques were employed, including elemental analysis, FT-IR spectroscopy, UV-Vis spectroscopy, molar conductivity measurements, magnetic moment determination, and melting point analysis. The results were shown that the metal complexes formed have the formula [Cr(L)2Cl2] Cl.H2O and [Rh(L)2(H2O)2] Cl3.H2O, where L= mannich base ligand. Based on spectroscopic analytical, coordination with metal ions involves the 'N' donor atom of mannich base
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the