Fifteen local isolates of Pseudomonas were obtained from several sources such as soil, water and some high-fat foods (Meat, olives, coconuts, etc.). The ability of isolates to produce lipase was measured by the size of clear zone on Tween 20 solid medium and by measuring the enzymatic activity and specific activity. Isolate M3 (as named in this study) was found to be the most efficient for the production of the lipase with enzymatic activity reached 56.6 U/ml and specific activity of 305.94 U/mg. This isolate was identified through genetic analysis of the 16S rRNA gene. and it was shown that the isolate M3 belongs to Pseudomonas aeruginosa with 99% similarity. The DNA of isolate M3 was extracted and lipase gene was amplified through PCR technique, then purified and cloned into E.coli DH5α cells first using pTG19-T plasmid, and expressed in E.coli Bl21 with expression vector pet-28a. The activity of lipase from transformed E.coli Bl21 was 196.6 U/ml and the specific activity 618.2 U/mg.
Graph is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree are determined.
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
Obesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.
In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t
Colonialism as a movement was very popular in Europe more than two centuries before. It aimed at controlling and exploiting several countries in Africa and Asia in addition to imposing their power and control on uninhabited islands. It received adherence and criticism as well. There also appeared activists and nations who stood against it and its practices. English novels discussed this notion greatly by pointing out the bad practices of the colonizers and how the colonized received them. This paper explores two narrative fictions that tackle the different aspects of the term. While Defoe, in Robinson Crusoe (1719), shows a colonial European figure who expresses his superiority, Wells, in “The Country of the Blind” (1904), deconstructs
... Show MorePoly-ether-ether-ketone (PEEK) was introduced in dentistry as an alternative to metal alloys.
To assess the effectiveness of PEEK-fixed retainers in preserving the stability of mandibular anterior and participant satisfaction as compared to the Dead-soft coaxial fixed retainer (DSC).
A single-centre, two-arm parallel groups
In order to select the optimal tracking of fast time variation of multipath fast time variation Rayleigh fading channel, this paper focuses on the recursive least-squares (RLS) and Extended recursive least-squares (E-RLS) algorithms and reaches the conclusion that E-RLS is more feasible according to the comparison output of the simulation program from tracking performance and mean square error over five fast time variation of Rayleigh fading channels and more than one time (send/receive) reach to 100 times to make sure from efficiency of these algorithms.
Resumen
El presente trabajo nace de una inquietud por la enseñanza del español en Irak a nivel universitario especialmente ante las dificultades que los alumnos árabes en general, e iraquíes en particular, encuentran en su proceso de aprendizaje. Nuestra primera inclinación fue, pues, prestar una atención directa y cercana al alumno como sujeto del aprendizaje, así como a lo que el alumno produce como resultado del mismo. En el presente trabajo pretendemos dotar al estudiante de los conocimientos lingüísticos necesarios para poder interaccionar en una variedad de situaciones y enfrentarse a problemas cotidianos, de manera que desarrolle las destrezas comunicativas que le permitan establecer una co
... Show MorePurpose: The current research attempts to diagnosis the reflection level of Information Technology (IT) Capabilities (Architectural, infrastructure, human resources, relationships resources, and dynamic capabilities) at Baghdad soft drinks Company/Al- Zafaraniya to achieving the competitive superiority represented by indicators (Cost, quality, flexibility, delivery and innovation). Recognizing the importance of the subjects studied, and because of the importance of the expected results of the field under consideration.
Design/Methodology/Approach: The experimental method has been used, the questionnaire used to collect th
... Show More