L-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 day at 4°C, and its retained a full activity for 36 continue usage; while it retained 84.63% of its original activity after 50 continue usage. Immobilized enzyme could to get about 85% of D-tagatose from 100 gm\L of D-galactose as a substrate with at 80 rpm of reaction speed for 24 hr.
Alloys of GaxSb1-x system with different Ga concentration (x=0.4, 0.5, 0.6) have been prepared in evacuated quartz tubes. The structure of the alloys were examined by X-ray diffraction analysis (XRD) and found to be polycrystalline of zincblend structure with strong crystalline orientation (220). Thin films of GaxSb1-x system of about 1.0 μm thickness have been deposited by flash evaporation method on glass substrate at 473K substrate temperature (Ts) and under pressure 10-6 mbar. This study concentrated on the effect of Ga concentration (x) on some physical properties of GaxSb1-x thin films such as structural and optical properties. The structure of prepared films for various values of x was polycrystalline. The X-ray diffraction analy
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreThe research problem arose from the researchers’ sense of the importance of Digital Intelligence (DI), as it is a basic requirement to help students engage in the digital world and be disciplined in using technology and digital techniques, as students’ ideas are sufficiently susceptible to influence at this stage in light of modern technology. The research aims to determine the level of DI among university students using Artificial Intelligence (AI) techniques. To verify this, the researchers built a measure of DI. The measure in its final form consisted of (24) items distributed among (8) main skills, and the validity and reliability of the tool were confirmed. It was applied to a sample of 139 male and female students who were chosen
... Show MoreReduction has been linked visually in art since man began making functional and aesthetic forms, and this beginning can be identified with cave paintings. Reduction is one of the clearest indications of intellectual presence in aesthetic experience. Modernism was greatly supported by the great transformations that the intellectual movement witnessed in the world in general and in Europe in particular. There, and their transfer of European artistic experiences, and the reflection of this influence in their aesthetic sculptures, and for this reason the researchers find that the study of the aesthetic references of the reductive forms in the Iraqi sculptural experience represents a great importance in the study of the history of contem
... Show MoreThe method of operational matrices is based on the Bernoulli and Shifted Legendre polynomials which is used to solve the Falkner-Skan equation. The nonlinear differential equation converting to a system of nonlinear equations is solved using Mathematica®12, and the approximate solutions are obtained. The efficiency of these methods was studied by calculating the maximum error remainder ( ), and it was found that their efficiency increases as increases. Moreover, the obtained approximate solutions are compared with the numerical solution obtained by the fourth-order Runge-Kutta method (RK4), which gives a good agreement.
