Forty one isolates of genus Proteus were collected from 140 clinical specimens such as urine, stool, wound, burn, and ear swabs from patients of both sex. These isolates were identified to three Proteus spp. P. mirabilis, P. vulgaris and P. penneri .The ability of these bacteria to produce L-asparaginase II by using semi quantitative and quantitative methods was determined. P. vulgaris Pv.U.92 was distinguished for high level of L-asparaginase II production with specific activity 1.97 U/mg. Optimum conditions for enzyme production were determined; D medium with 0.3% of L-asparagine at pH 7.5 with temperature degree 35°C for incubation. Ultrasonication was used to destroy the P. vulgaris Pv.U.92 cells then ASNase II was extracted and purified throughout several purification steps including precipitation with (NH4)2SO4(60-80%), DEAE-cellulose ion exchanger chromatography followed by Sephacryl S-300 filtration. The specific activity was 155.6 U/ mg and the purification fold was 27.3 with 10.4% yield.
Atenolol was used with ammonium molybdate to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on reaction between atenolol and ammonium molybdate in an aqueous medium to obtain a dark brown precipitate. Optimum parameters was studied to increase the sensitivity for developed method. A linear range for calibration graph was 0.1-3.5 mmol/L for cell A and 0.3-3.5 mmol/L for cell B, and LOD 133.1680 ng/100 µL and 532.6720 ng/100 µL for cell A and cell B respectively with correlation coefficient (r) 0.9910 for cell A and 0.9901 for cell B, RSD% was lower than 1%, (n=8) for the determination of ate
... Show MoreOne of the Kurdish scholars who have research on the doctrinal issues of the author of this brief message that we are about to achieve; to bring it out better and in order to preserve the Islamic heritage, and revive what can be revived after being close to death by staying in libraries here and there, out of reach of hands, carrying dust Years of forgetting and marginalization, and this letter is the papers in the door of the divorce entitled his author "Iqdar al-dream for those who did not sign divorce commoner," and the name is evident the name, and the intention of the author through writing, where he wrote it to answer some of the knowledgeable among the public at the time So they decreed that there was no divorce from commoners D w
... Show MoreThe implicit is the narrative technique used to give indirect hidden messages. To read between the lines means to understand the implicit meaning that is not directly indicated. This technique is expressed in two forms: the hypothesis and the implications of linguistic and non-linguistic rules. Nathalie Sarraute’s "Pour un oui ou pour un non" states this narrative method through her character’s verbal and non-verbal dialogue. The present paper discusses the implicit method and shows the reason behind which the author uses it in her play "Pour un oui ou pour un non".
Résumé
... Show MoreThe present work focuses on examining the strategy of cognitive trips and the Arabic language teachers’ training needs of such a strategy when teaching Arabic language courses in the Saudi Arabia Kingdom. To achieve the objective of the study, and check whether this strategy is used in lesson planning, lesson teaching, or lesson assessment, a descriptive approach and a questionnaire have been adopted. The researchers used a number of statistical tools, and chose a purposive sample, which consists of (58) Arabic language teachers from Saudi Arabia Kingdom. Results have shown that the training needs of Arabic language teachers for implemining the strategy of cognitive journeys while teaching Arabic language courses came in the following
... Show MoreIn this work, polynomials and the finite q-exponential operator are constructed. The operator is used to combine an operator proof of the generating function with its extension, Mehler's formula with its extension and Roger's formula for the polynomials . The generating function with its extension, Mehler's formula with its extension and Rogers formula for Al-Salam-Carlitz polynomials are deduced by giving special values to polynomials .
Powder Silica (SiO2) was added to epoxy polymer with different weight percentages (3.75,7.5,11.25 and 15 wt%) for particle size  63 µm. Hand lay-up method it is used to prepared (Epoxy-Silica) composite, and cutting appropriate specimens for testing. Electrical strength varies nonlinearly with specimens thickness, also decreasing with average time for the rise of voltage decreases due to electro thermal effects. Clearly, electrical strength decreases with the increase of the proportion of added silica. The hardness, tensile strength and young modulus increased with the added silica increases due to changing in material characteristics from ductility to brittle. Microscopic cracks and irregularity deformation were a
... Show MoreIn this article, the effects of the O2 ratio on the electrical characteristics, including the I-V characteristic curve, Panchen’s curve, and I-P curve, were tested in a sample of O2/Ar gaseous mixture . The sample was produced by plasma-based DC magnetron sputtering with niobium metal as a target material. The inter-electrode spacing value was 4 cm. Plasma diagnosis via the Optical Emission Spectroscopy (OES) method was used to achieve Te and Ne mixture values of 20 %, 30 %, 50%, and 70% in the Ar/O2 system. The results showed that the discharge is operating in the abnormal glow region and the discharge current was decreased by increasing O2 percentage. In addition, the experimenta
... Show MoreIn recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al
... Show MoreOur study comes up to clarify the role of television in spreading the culture of violence with a child. This study represents one of the important studies that have tried to highlight the impact of these programmes, particularly cartoons, on the child's behaviors, actions and acquired habits.Violence considers a common phenomenon among the people, as the role of the media, particularly TV has a vital role due to its properties, characteristics and its significant impact on different segments and groups in society and in children particularly through exposure to programmes of films.The results of the study have been affected by the rising proportion of females to males, and that the contribution of real life has a big role in the child ac
... Show MoreEnvironmental Tax is deemed as one of the most important tools that can be used to eliminate the problem of oil –based environment pollution resulted out of oil products processes and this has been significantly approved by the experience in those leading countries in the field of protecting the environment against pollution whereas oil-producing countries which are rather awkward in maintaining the environment such as Iraq , suffer from notorious environmental effects pertaining to oil product processes.
The problem of the research is represented the increased and constant rise in the volume of the environmental pollutants resulted from the processes managed by the intern
... Show More