Isolation And Characterization Of Proteolytic Bacteria And Its Protease
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 2
Abstract
Soil samples from different habitats like river, garden, garbage dumping areas were collected. These samples were screened for the presence of proteolytic bacteria. The isolates were selected on the isolates forming larger zones were selected because of casein hydrolysis. The isolates were further screened for pure colonies. The bacteria found was rod shaped, gram positive, catalase positive, acid producing. The enzyme gave positive results for gelatin hydrolysis. The enzyme was active at 40°C to 50°C temperature and showed optimum activity at pH 5.
Authors and Affiliations
Himani Ravish
EFFECT OF COFFEE ON MICRO ORGANISM
The research work in this paper is on effect on coffee on the growth of microorganism. Caffeine is the active component of coffee .I t is a plant alkaloid which is found in more than 60 plant species just like coffia ar...
A Real Time Implementation System for Physical Disabled People Through ZIGBEE Protocol
A disability is a condition or function judged to be significantly impaired relative to the usual standard of an individual or group. Effective usage of science and technology may help disable people to lead their life...
TEXT INFORMATION EXTRACTION USING RULE BASED METHOD
Information is hidden in large volume of files thus it is necessary to find useful information and extract it from file contents. Information Extraction (IE) is the task of automatically extracting structured informati...
USING RFID TO TRACK PATIENT’S HEALTH
When we hear the word patient, the first thing that strikes our mind is a hospital and lots of treatments and tests that are being done on him/her by doctors. In a hospital, there are many patients and these patie...
An Audit of Server Hardening in Multi-Tenantarchitecture System in Cloud Computing
In cloud computing, multi-tenancy is the architecture in which hardware and software can be shared with multiple users (tenant). In existing system, there is no protection on the operating system level when corpor...