Peroxidase is a class of oxidation-reduction reaction enzyme that is useful for accelerating many oxidative reactions that protect cells from the harmful effects of free radicals. Peroxidase is found in many common sources like plants, animals and microbes and have extensive uses in numerous industries such as industrial, medical and food processing. In this study, P. aeruginosa was harvested to utilize and study its peroxidases. P. aeruginosa was isolated from a burn patient, and the isolate was verified as P. aeruginosa using staining techniques, biochemical assay, morphological, and a sensitivity test. The gram stain and biochemical test result show rod pink gram-negative bacteria, and ensure that the isolate was that of P. aeruginosa. Optimization for bacterial growth were done by used more than pH (5,7,9) and temperatures (32,35,37°C), and it was found that the best growth conditions were at pH 5.5, producing (4.5x108cells), and a temperature of 37°C, with (5.25x108cells) being produced. Intracellular enzymes were extracted by ultra-sonication that used frequencies of ultrasound 30 kHz for 20 min in 4 °C, and was centrifuged at 13000×g for 5min. The supernatant was then re-used as a crude enzymatic extract and the cell pellet was discarded. Purification of peroxidase was accomplished by using salt precipitation, dialysis, gel filtrations and ion exchange chromatographic techniques. The result shows that gel filtration has optimal specific activity and purification fold at (61 U/ml), purification fold 6 times and then the improvement enzyme was applied as H2O2 scavenging activity antioxidant by used three concentration of enzyme (10,40,60 µg/ml), and show higher scavenging activity at 60 µg/ml, which reached to 45% scavenging activity. The enzyme was also used as anticancer agent, which was verified by using three concentration of enzyme (10,15,20 µg/ml) which show a significant kill for Mcf-7cells at (15µg/ml), with cytotoxicity activity reaching (45%).
Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.
... Show MoreCryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The
... Show MoreInfertilityis oneuof the most problemsathatufacingaadvancedunations. In the general, about halfof allacasesaof the infertility are causedby factors thaturelated toathe male partner. Propos educausesvofumalev infertility include evgeneticuand environmental factors. Blood samples from 64 infertileumen allawere living in urban its al-Fallujah city (30 azospermeiauand 34 oligospermeia) and 32 fertile men (asuthe control group) were collected. Heavy metal concentrations inusera of infertile and fertile groupswereumeasured by using Atomic Absorption Spectrophotometer. Y- chromosomemicrodeletions were detected by using PCR techniques. Significantdifferences (P?0.05)uin the concentration ofucopper (0.0267±0.0147 and 0.0278±0.0273, for infertileua
... Show MoreWhat happened on the Iraq war in 2003 put the problematic about what can happen from a shift in the style of individual or collective in contemporary Iraqi art similar to what is known in the history of the modern art world.
It wanted the researcher to identify this dilemma in academic study looking for an explanation of this Alastfhamat from the entrance of the definitions shows laparoscopic destination, as it determines the address (b style in painting contemporary Aeraa before and after the war) was a comparative analysis, through a choice of two Iraqi artists who have production style known sets since before the war, in order to read the transformation that took place in art before and after their tactics, and in order to off
... Show MoreUse of computer simulation to quantify the effectiveness of blowing agents can be an effective tool for optimizing formulations and for the adopting of new blowing agents. This paper focuses on a mass balance on blowing agent during foaming including the quantification of the amount that stays in the resin, the amount that ends up in the foam cells, and the pressure of the blowing agent in the foam cells. Experimental data is presented both in the sense of developing the simulation capabilities and the validating of simulation results.
The basic concepts of some near open subgraphs, near rough, near exact and near fuzzy graphs are introduced and sufficiently illustrated. The Gm-closure space induced by closure operators is used to generalize the basic rough graph concepts. We introduce the near exactness and near roughness by applying the near concepts to make more accuracy for definability of graphs. We give a new definition for a membership function to find near interior, near boundary and near exterior vertices. Moreover, proved results, examples and counter examples are provided. The Gm-closure structure which suggested in this paper opens up the way for applying rich amount of topological facts and methods in the process of granular computing.
This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp
The paper delves into the examination of trauma portrayals in Heather Raffo's “Noura” (2019). Raffo examines the challenges faced by two Iraqi women, Raffo and Maryam, in relation to parenthood following the capture of Iraq by “ISIS”. The paper is concerned with the various depictions of trauma that Raffo accomplishes in the text then delves in the way she cocooned her characters’ identity in order to recover their traumas. Initially, Noura is a trauma tale, illustrating the recurrent and repetitive nature of trauma from mother to daughter. The narrative reflects the interactions and dynamics between the mother and daughter and their function as substitutes for memory and recounting personal narratives. Moreover, examin
... Show More