The cytotoxicity of different concentrations of purified methionine γ- lyase from Pseudomonas putida on cancer cell lines (RD, AMN3 and AMGM) at 96 hr was studied. The bacterial enzyme with concentration 1000µg/ml was revealed highly cytotoxicity against cancer cell lines in comparison with other concentrations whereas slight cytotoxicity was observed on normal cell (REF).
Steel fiber aluminum matrix composites were prepared by atomization technique. Different air atomization conditions were considered; which were atomization pressure and distance between sample and nozzle. Tensile stress properties were studied. XRF and XRD techniques were used to study the primary compositions and the structure of the raw materials and the atomized products. The tensile results showed that the best reported tensile strength observed for an atomization pressure equal to 4 mbar and sample to nozzle distance equal to 12 cm. Young modulus results showed that the best result occurred with an air atomization pressure equal to 8 mbar and sample to nozzle distance equal to 16cm
This study was carried out to obtain the optimum conditions necessary for the process of soya protein hydrolysis by using hydrochloric acid (as a chemical catalyst) instead of the papain enzyme (as a biological catalyst), for the production of soya peptone. These conditions are implemented to test the effect of the variables of the process of hydrolysis on the nature and quality of the product.
The production of soya peptone was studied for their importance in the process of preparing and producing the culture media used in medical and microbiological laboratories.
The process of production of soya peptone includes four main
... Show MoreBackground: Dentin removed during root canal system instrumentation for creating adequate geometry for the canal and cleaning the canal. A new instrument had been marketed with the aim of optimum shaping of all parts of the canal system, however, no information present about the amount of dentin removal compared to conventional rotary system. This study investigated the amount of dentin removal when the canal instrumented by SAF compared with ProTaper by using high resolution computed tomography (micro CT). Materials and Methods: Twenty extracted single canalled teeth were utilized for this study; and randomly divided into 2 groups. In the first group, the root canals were prepared by using protaper rotary system till F2 and the root canal
... Show MoreIn this paper, the theoretical cross section in pre-equilibrium nuclear reaction has been studied for the reaction at energy 22.4 MeV. Ericson’s formula of partial level density PLD and their corrections (William’s correction and spin correction) have been substituted in the theoretical cross section and compared with the experimental data for nucleus. It has been found that the theoretical cross section with one-component PLD from Ericson’s formula when doesn’t agree with the experimental value and when . There is little agreement only at the high value of energy range with the experimental cross section. The theoretical cross section that depends on the one-component William's formula and on-component corrected to spi
... Show MoreBackground: Glass ionomers have good biocompatibility and the ability to adhere to both enamel and dentin. However, they have certain demerits, mainly low tensile and compressive strengths. Therefore, this study was done to assess consistency and compressive strength of glass ionomer reinforced by different amount of hydroxyapatite. Materials and Methods: In this study hydroxyapatite materials were added to glass ionomer cement at different ratios, 10%, 15%, 20%, 25% and 30% (by weight). The standard consistency test described in America dental association (ADA) specification No. 8 was used, so that all new base materials could be conveniently mixed and the results would be of comparable value and the compressive strength test described by
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
There are many images you need to large Khoznah space With the continued evolution of storage technology for computers, there is a need nailed required to reduce Alkhoznip space for pictures and image compression in a good way, the conversion method Alamueja