Response surface methodology (RSM) based on central composite design was successfully applied to redesign MRS media for maximizing both biomass and bacteriocin production from Lactobacillus plantarum NH40. First, glucose and yeast extract were chosen as the best carbon and nitrogen sources based on classical optimization results of one factor at time which also revealed the possibility of eliminating peptone and meat extract from the original composition of medium without affecting the growth and bacteriocin production. Statistical experimental design based on a regression model generated using the Design expert 7 software showed that the optimum concentrations of glucose, yeast extract, tween80, NH4Cr, CH3COONa and K2PO4 were 40, 19.9, 1, 3.06, 7, 1.25 g/L respectively for maximum production of biomass (15.87 mg/mL) and bacteriocin (634.74 U/mL). In addition, from the analysis of variance, yeast extract with F-value 77.2 and glucose with 185.4 were the most effective factors on biomass and bacteriocin production. Formulation of empirical model explained that the interaction among factors showed that the determination coefficient R2 of biomass and bacteriocin production were 0.8777 and 0.8539 respectively. Furthermore, the accuracy of model of the optimized MRS medium suggested by design expert 7 for both biomass and bacteriocin was verified and results showed that concentrations of biomass and bacteriocin were 15 mg/mL and 640AU/mL respectively, which were approximately closed to predicted values.
This investigation presents an experimental and analytical study on the behavior of reinforced concrete deep beams before and after repair. The original beams were first loaded under two points load up to failure, then, repaired by epoxy resin and tested again. Three of the test beams contains shear reinforcement and the other two beams have no shear reinforcement. The main variable in these beams was the percentage of longitudinal steel reinforcement (0, 0.707, 1.061, and 1.414%). The main objective of this research is to investigate the possibility of restoring the full load carrying capacity of the reinforced concrete deep beam with and without shear reinforcement by using epoxy resin as the material of repair. All be
... Show MoreIn this paper the behavior of the quality of the gradient that implemented on an image as a function of noise error is presented. The cross correlation coefficient (ccc) between the derivative of the original image before and after introducing noise error shows dramatic decline compared with the corresponding images before taking derivatives. Mathematical equations have been constructed to control the relation between (ccc) and the noise parameter.
Calculation of the power density of the nuclear fusion reactions plays an important role in the construction of any power plants. It is clear that the power released by fusion reaction strongly depended on the fusion cross section and fusion reactivity. Our calculation concentrates on the most useful and famous fuels (Deuterium-tritium) since it represents the principle fuels in any large scale system like the so called tokomak.
Simple, sensitive and economical spectrophotometric methods have been developed for the determination of cefixime in pure form. This method is based on the reaction of cefixime as n-electron donor with chloranil to give highly colored complex in ethanol which is absorb maximally at 550 nm. Beer's law is obeyed in the concentration ranges 5-250 µg ml-1 with high apparent molar absorptivities of 1.52×103 L.mole-1. cm-1.
This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
The eggshell cuticle is the proteinaceous outermost layer of the eggshell which regulates water exchange and protects against entry of micro-organisms. Outer eggshell and cuticle protein was extracted from domestic chicken. The aim of the research is to find out the effect of the treated and untreated nano particles of egg shells with micro wave cold plasma on the effectiveness of E. coli (negative bacteria) that infect the skin and measure the diameter of bacterial inhibition zone, the eggshell has been prepared by a chemical method (sol gel) and measure the level of acidity and the PH is neutral. The result of Atomic Force Microscope (AFM) shows that the particles diameters become smaller with nano-particles solution than for egg
... Show MoreBACKGROUND: Cochlear implant has become a routine procedure for management of severe sensorineural hearing loss. Cochlear implant extrusion is one of the most devastating complication of this procedure. A double layer closure of pericranial flap and scalp rotational flap has being showed to decrease the rate of late implant extrusion.OBJECTIVE:The purpose of this study is to evaluate the use of the pericranial flap as second layer coverage after cochlear implant extrusion.PATIENTS AND METHODS:Eight patients with cochlear implant extrusion in Al-Shaheed Gazi Al-Hariri hospital were operated on by using two layer closure ; the pericranial flap as salvage layer used to cover the cochlear implant and scalp rotational flap as a routine coverage,
... Show MoreData transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp
... Show MoreGypseous soils are common in several regions in the world including Iraq, where more than 28.6% of its surface is covered with this type of soil. This soil, with high gypsum content, causes different problems for construction and strategic projects. As a result of water flow through the soil mass, the permeability and chemical arrangement of these soils varies with time due to the solubility and leaching of gypsum. In this study, the soil of 36% gypsum content, was taken from one location about 100 km southwest of Baghdad, where the samples were taken from depths (0.5 - 1) m below the natural ground and mixed with (3%, 6%, 9%) of Copolymer and Novolac polymer to improve the engineering properties that include: collapsibility, perm
... Show More