The present study aims to detection optimal conditions of production of amylase enzyme from isolate of B. subtillis A4. Nine carbonic sources were represented by starch, maltose, fructose, sucrose, glucose, arabinose, xylose, sorbitol and mannitol) at concentration of 1% for each source. It was found that the best was represented by starch carbonic, which showed higher activity and qualitative activity of 7.647 Unit/ ml and 461.56 Unit/ mg. Ten nitrogen sources were selected, including yeast extract, peptone, trypton, gelatin, urea and meat extract as organic sources Ammonium sulphate, Sodium nitrate, Potassium nitrate and Ammonium chloride as inorganic sources. These sources were added at aconcentration of 0.5% to the production medium. The Peptone source was the best of used nitrogenic sources at concentration of 1%, which showed high activity and qualitative activity at 9.651 Unit/ ml and 506.29 Unit/ mg. The best hydrogen number was 7 there inculcation which showed higher activity and qualitative activity of 14.3 Unit/ ml and 569.38 Unit/ mg. The size of inoculums of 2 × 108 cell was the best which showed high activity and qualitative activity of 16.213 Unit/ ml and 592.9 Unit/ mg.
The main purpose of the research is to study the significance of the event in the explicit source and its significance in the Mimi source and to explain the difference between them in the Holy Quran, especially since most linguists were not interested in what the Mime source indicates in the text, but focused on its form and form, as they defined it as the name Linguists and grammarians did not mention a difference in meaning between the explicit source and the Mimi source, and they interpret the second in the first sense, which led me to choose this topic, to know the significance of each source through Appeal to the maqam and occasion in a challenge D The exact meaning.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThe research is marked by (Development Design Interior spaces for children's theater halls in the city of Baghdad). Which consists of four chapters, namely, the first chapter the research problem and the need for him, which included identifying the research problem and of poor achievement of aesthetic values and functional at the scene of the child and its significance in that it is a way of cultural entertainment education of the child and its objectives as it aims to evelop interiors for children's theater, and its limits. Theater Magic Lantern in the city of Baghdad, the second chapter addressed the theoretical framework, which consists of the psychology of the child, and space Children's Theatre and types, forms of children's theater
... Show MoreLuminescent solar concentrator (LSC) are used to enhance photoresponsivity of solar cell. The Quantumdots luminescent solar concentrator (QDLSC) consists of CdSe/CdS core/shell nanoparticles embedded in polyacrylamide polymer matrix positioned on the top surface of the silicon solar cell. This procedure improves the conversion efficiency of the bare silicon solar cell. The conversion efficiency of the solar cell has increased from 7.3% to 10.3%. this improvement is referred to the widening of the response spectral region window of the a- Si. Solar cell.
Abstract
This research aims to reform the Iraqi public budget through going into the challenges the budget faces in applying item-line budget in its preparation, implementation and control; which encourage extravagance and waste instead of rationalizing expenditures. This is shown in the data analysis of Federal public budget laws in Iraq for the years from 2005 till 2013; there was a continuous increase in the aggregate public expenditures in the public budget for the years previously mentioned, as the public expenditures growth has reached into the percent 284.71% in 2013. In addition the public budget for these years (2005-2013) is being prepared with planned deficit without confirming that
... Show MoreA vector in a separable infinite dimensional Hilbert space is called disk-cyclic for bounded operator if the orbit α : 0, α∈;|∝| 1is dense in. The useful tool used to discover codisk-cyclic operation is called the disk-cyclic Criterion. In this paper we will show that some equivalent conditions of the
Purpose – The Cloud computing (CC) and its services have enabled the information centers of organizations to adapt their informatic and technological infrastructure and making it more appropriate to develop flexible information systems in the light of responding to the informational and knowledge needs of their users. In this context, cloud-data governance has become more complex and dynamic, requiring an in-depth understanding of the data management strategy at these centers in terms of: organizational structure and regulations, people, technology, process, roles and responsibilities. Therefore, our paper discusses these dimensions as challenges that facing information centers in according to their data governance and the impa
... Show MoreTaken the word the word God itself the task when the Muslim calligraphers because of its holiness and majesty and altitude, so take Calligraphers innovate in their design, which represents the images and forms experiencing them prolific artistic output to highlight the aesthetic value through the use of Kufic script which is one of the most prominent lines his susceptibility diversity decorative Add the possibility of extending the letters in different directions because of the vision calligrapher aesthetic and an investigation is required for the word of the design, so the researcher examined by dividing into four chapters,Was the first research problem and the importance and goals and identify the term, while the second chapter was div
... Show MoreThe reciprocal relationship between the text and the mask in the printed product is one of the most important relationships that frame the level of communication between the appearance and the interior, although it is not cared for by some designers and publishing institutions. Therefore, the problem of research is determined by the following question (What is the dialectical relationship between the text and the mask in the literary books covers design?). The research aims to shed light on this problematic relationship at the level of reception and aesthetics at the same moment. The theoretical framework included two sections: the first (mask and text ... the concept and the mutual relationship), while the second section (trends in the
... Show More