Peroxidase is a class of oxidation-reduction reaction enzyme that is useful for accelerating many oxidative reactions that protect cells from the harmful effects of free radicals. Peroxidase is found in many common sources like plants, animals and microbes and have extensive uses in numerous industries such as industrial, medical and food processing. In this study, P. aeruginosa was harvested to utilize and study its peroxidases. P. aeruginosa was isolated from a burn patient, and the isolate was verified as P. aeruginosa using staining techniques, biochemical assay, morphological, and a sensitivity test. The gram stain and biochemical test result show rod pink gram-negative bacteria, and ensure that the isolate was that of P. aeruginosa. Optimization for bacterial growth were done by used more than pH (5,7,9) and temperatures (32,35,37°C), and it was found that the best growth conditions were at pH 5.5, producing (4.5x108cells), and a temperature of 37°C, with (5.25x108cells) being produced. Intracellular enzymes were extracted by ultra-sonication that used frequencies of ultrasound 30 kHz for 20 min in 4 °C, and was centrifuged at 13000×g for 5min. The supernatant was then re-used as a crude enzymatic extract and the cell pellet was discarded. Purification of peroxidase was accomplished by using salt precipitation, dialysis, gel filtrations and ion exchange chromatographic techniques. The result shows that gel filtration has optimal specific activity and purification fold at (61 U/ml), purification fold 6 times and then the improvement enzyme was applied as H2O2 scavenging activity antioxidant by used three concentration of enzyme (10,40,60 µg/ml), and show higher scavenging activity at 60 µg/ml, which reached to 45% scavenging activity. The enzyme was also used as anticancer agent, which was verified by using three concentration of enzyme (10,15,20 µg/ml) which show a significant kill for Mcf-7cells at (15µg/ml), with cytotoxicity activity reaching (45%).
study aimed to recognize the relationship shyness and depression and to recognize the differences between the genders, according to the variable of shyness and depression, the sample consisted (214) students, (141) female (73) male, and the sample responded scale of shyness and Inventory beck for depression, The Results of this study show that: the sample has a low degree shyness and a high degree depression, . There are no statistically significant differences according to gender variable in shyness, and there are statistically significant differences according to gender variable in depression favor for male, and there are statistically significant relationships between the variables of the study at lev
... Show MoreAbstract
All central air conditioning systems contain piping system with various components, sizes, material, and layouts. If such systems in operating mode, the flow in piping system and its component such as valves can produce severe vibration due to some flow phenomenon’s. In this research, experimental measurements and numerical simulation are used to study the flow-induced vibration in valves. Computational fluid dynamics (CFD) concepts are included with one-way and two-way fluid-structure interaction concepts by using finite element software Package (ANSYS 14.57). Detection analysis is performed on flow characteristics under operation conditions and relations with structural vibration. Most of
... Show MoreThe study seeks to examine the level of personal efficacy and its relation to mental alertness among university students. Besides, the statistically significant differences in regard of students' gender, and the correlation between male and female. To do this, the researcher adopted two scales: one to measure the personal efficacy which was made up by (abed al-jabaar, 2010) included (26) items, and the other to measure the mental alertness that designed by (abed Allah, 2012) included (36) items. A total of (120) student were selected randomly from three-different colleges at the Al-Mustansiriyah University for the academic year 2016-2017. The findings revealed there are no significant differences among students in regard of the personal
... Show MoreEmbedding an identifying data into digital media such as video, audio or image is known as digital watermarking. In this paper, a non-blind watermarking algorithm based on Berkeley Wavelet Transform is proposed. Firstly, the embedded image is scrambled by using Arnold transform for higher security, and then the embedding process is applied in transform domain of the host image. The experimental results show that this algorithm is invisible and has good robustness for some common image processing operations.
This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp
After receipt of military commanders power in 1980, they were determined to solve the
Kurdish question by force, just like their predecessors in resolving such issues, and the
situation became worse when the Kurdish resistance in a more organized than previous years
and behind the Party (PKK) .
After the mass support of the Kurdish widespread party get involved most of the Kurdish
youth in the party organization of the (PKK), prompting Turkish President then to make
decisions and take immediate action firm against the party, but the Kurdish issue began
Tthlhal when he arrived at the helm of President Turgut Ozal in 1989, he worked on the
development of the areas inhabited by the Kurds, specifically the Southeast A
Since the property in Islam is based on the principle of succession , "which made you Khalaúv land and raise yourselves above some degree of Iblukm with Atakm The Lord of the fast punishment and it is Forgiving, Merciful " [cattle : 165 ] and human only Mstkhalaf where " God promised you who believe and do good deeds for Istkhalvenhm Normans in the ground as those before them " [Nur : 55 ] , considering that King God alone any talk about having ownership in Islam in the contemporary sense of ownership , containing three rights are:
1- right to dispose of the right of usufruct tenure
2-The concept is ambiguous as long as that man Mstkhalaf does not have the right to dispose
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called