Peroxidase is a class of oxidation-reduction reaction enzyme that is useful for accelerating many oxidative reactions that protect cells from the harmful effects of free radicals. Peroxidase is found in many common sources like plants, animals and microbes and have extensive uses in numerous industries such as industrial, medical and food processing. In this study, P. aeruginosa was harvested to utilize and study its peroxidases. P. aeruginosa was isolated from a burn patient, and the isolate was verified as P. aeruginosa using staining techniques, biochemical assay, morphological, and a sensitivity test. The gram stain and biochemical test result show rod pink gram-negative bacteria, and ensure that the isolate was that of P. aeruginosa. Optimization for bacterial growth were done by used more than pH (5,7,9) and temperatures (32,35,37°C), and it was found that the best growth conditions were at pH 5.5, producing (4.5x108cells), and a temperature of 37°C, with (5.25x108cells) being produced. Intracellular enzymes were extracted by ultra-sonication that used frequencies of ultrasound 30 kHz for 20 min in 4 °C, and was centrifuged at 13000×g for 5min. The supernatant was then re-used as a crude enzymatic extract and the cell pellet was discarded. Purification of peroxidase was accomplished by using salt precipitation, dialysis, gel filtrations and ion exchange chromatographic techniques. The result shows that gel filtration has optimal specific activity and purification fold at (61 U/ml), purification fold 6 times and then the improvement enzyme was applied as H2O2 scavenging activity antioxidant by used three concentration of enzyme (10,40,60 µg/ml), and show higher scavenging activity at 60 µg/ml, which reached to 45% scavenging activity. The enzyme was also used as anticancer agent, which was verified by using three concentration of enzyme (10,15,20 µg/ml) which show a significant kill for Mcf-7cells at (15µg/ml), with cytotoxicity activity reaching (45%).
The (E)-4-chloro-N-(2-(dimethylamino)ethyl)-5-((8-hydroxy quinolin-5-yl)diazenyl)-2-methoxybenzamide azo ligand (L) has been synthesized through the reaction of diazonium salt for 5-amino-4-chloro-N-(2-(dimethylamino) ethyl)-2-methoxybenzamide with 8-hydroxyquinoline and identified azo ligand (L) using spectroscopic studies (FTIR, UV-Vis, 1H and 13CNMR, mass), and micro-elemental analysis (C.H.N). Metal chelates of Co(II), Ni(II), Cu(II), as well as Zn(II) have been completed as well as characterized using mass spectra, flame atomic absorption, elemental analysis (C.H.N), infrared, UV-Vis spectroscopy, as well as conductivity, magnetic measurements. The metal-to-ligand ratio in all complexes, as determined by analytical data, was 1:2 and ex
... Show MoreIntroduction: Articaine was developed in 1969, with reported advantages which are increased potency, increased duration of its anesthetic effect and superior diffusion through bony tissue. The effectiveness of using 4% articaine infiltration for extraction of mandibular molar teeth in comparison to 2% lidocaine inferior alveolar nerve block is not settled yet. Aim: The aim of this study was to evaluate the effectiveness of using 4% articaine infiltration for extraction of mandibular molars by comparing it to the use of 2% lidocaine inferior alveolar nerve block in terms of success, the volume of local anesthetic agents and the pain experienced during the procedure. Materials and methods: A prospective randomized controlled study included
... Show MoreA new generalizations of coretractable modules are introduced where a module is called t-essentially (weakly t-essentially) coretractable if for all proper submodule of , there exists f End( ), f( )=0 and Imf tes (Im f + tes ). Some basic properties are studied and many relationships between these classes and other related one are presented.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More
A new ligand [ 2-chloro-N- (1,5-dimethyl-3-oxo-2-phenyl-2,3-dihydro -1H-pyrazol- 4- ylcarbamothioyl)acetamide](L) was synthesized by reacting the Chloro acetyl isothiocyanate with 4-aminoantipyrine,The ligand was characterized by(C HNS) elemental microanalysis and the spectral measurements including Uv-Vis ,IR ,1H and13C NMR spectra, some transition metals complex of this ligand were prepared and characterized by Uv-Vis, FT-IR spectra, conductivity measurements, magnetic susceptibility and atomic absorption. From the obtained results the molecular formula of all prepared complexes were [M(L)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedra
Diabetic mellitus is one of the main risk factors of fungal infections because poor glycemic control is associated with a high level of glucose in blood and saliva which could be treated as nutrient to fungi. This study aimed to isolate and identification of pathogenic fungi from diabetic patient. 140 samples were taken from different places of human body from the national center of diabetic patients that related to Mustansiriyah University / college of medicine and Al-yarmuk Hospital in Baghdad. 84 sample (60%) tested positive to fungi and 56 sample (40%) tested negative to fungi. The most frequented fungi isolated have been chosen for molecular identification by PCR (Millerozyma farinosa and Candida orthopsilosis) using specific pri
... Show MoreA total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates
... Show MoreThe reconciliation of tax reconciliation is one of the legal methods used by the financial authority in Iraq, which is done with the taxpayer
The research dealt with the weakness of tax revenues for many reasons, including tax evasion, which led to the search for ways to reduce evasion to increase the tax revenue, and settlement reconciliation one of these means .
The research proceeded from the premise that the use of a more broadly settled settlement would govern the tax evasion of taxpayers.
The researchers used a series of studies and previous research, books and other sources related to the subject of research, and this was done through the theoretical framework, and the practical aspect that included the fin
... Show MoreThis work implements the face recognition system based on two stages, the first stage is feature extraction stage and the second stage is the classification stage. The feature extraction stage consists of Self-Organizing Maps (SOM) in a hierarchical format in conjunction with Gabor Filters and local image sampling. Different types of SOM’s were used and a comparison between the results from these SOM’s was given.
The next stage is the classification stage, and consists of self-organizing map neural network; the goal of this stage is to find the similar image to the input image. The proposal method algorithm implemented by using C++ packages, this work is successful classifier for a face database consist of 20
... Show More