L-arabinose isomerase from Escherichia coli O157:H7 Was immobilized with activated Bentonite from local markets of Baghdad, Iraq by 10% 3-APTES and treated with 10% aqueous glutaraldehyde, the results refer that the yield of immobilization was 89%, and pH profile of free and immobilized L-arabinose isomerase was 7 and 7.5 and it is stable at 6-8 for 60 min respectively, while, the optimum temperature was 30 and 35°C and it was stable at 35 and 40°C for 60 min but it loses more than 60 and 30% from its original activity at 50°C for free and immobilized L-arabinose isomerase respectively. Immobilized enzyme retained its full activity for 32 day, but it retained 73.58% of its original activity after storage for 60 day at 4°C, and its retained a full activity for 36 continue usage; while it retained 84.63% of its original activity after 50 continue usage. Immobilized enzyme could to get about 85% of D-tagatose from 100 gm\L of D-galactose as a substrate with at 80 rpm of reaction speed for 24 hr.
In the present work the Buildup factor for gamma rays were studied in shields from epoxy reinforced by lead powder and by aluminum powder, for NaI(Tl) scintillation detector size ( ×? ), using two radioactive sources (Co-60 and Cs-137). The shields which are used (epoxy reinforced by lead powder with concentration (10-60)% and epoxy reinforced by aluminum powder with concentration (10-50)% by thick (6mm) and epoxy reinforced by lead powder with concentration (50%) with thick (2,4,6,8,10)mm. The experimental results show that: The linear absorption factor and Buildup factor increase with increase the concentration for the powders which used in reinforcement and high for aluminum powder than the lead powder and decrease with inc
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreIn this paper, the computational method (CM) based on the standard polynomials has been implemented to solve some nonlinear differential equations arising in engineering and applied sciences. Moreover, novel computational methods have been developed in this study by orthogonal base functions, namely Hermite, Legendre, and Bernstein polynomials. The nonlinear problem is successfully converted into a nonlinear algebraic system of equations, which are then solved by Mathematica®12. The developed computational methods (D-CMs) have been applied to solve three applications involving well-known nonlinear problems: the Darcy-Brinkman-Forchheimer equation, the Blasius equation, and the Falkner-Skan equation, and a comparison between the met
... Show MoreExpansion the engineering consultancy offices in the universities of Iraq, about (14) offices, leading to increas the competition between them, especially after the great trends of Iraqi government agencies to use the academic experiences and their efficiencies in general, due to non-existence of the engineering qualification in the government institutions to do the engineering designs ,supervision of projects and other engineering works which are practicing by the engineering consultancy offices in order to get the best performance of the work.Within this serious competition, needing a specific approach to enable government agencies to choose the optimal and alternative consultancy office to meet specific project and not rely on cronyis
... Show MorePhotovoltaic (PV) devices are widely used renewable energy resources and have been increasingly manufactured by many firms and trademarks. This condition makes the selection of right product difficult and requires the development of a fast, accurate and easy setup that can be implemented to test available samples and select the cost effective, efficient, and reliable product for implementation. An automated test setup for PV panels using LabVIEW and several microcontroller-based embedded systems were designed, tested, and implemented. This PV testing system was fully automated, where the only human intervention required was the instalment of PV panel and set up of required testing conditions. The designed and implemented system was
... Show More