Partial Purification of Alpha-Amylase Produced by Brevibacillus Borstelensis R1
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Ideal purification should optimize both the purity and the concentration of the metabolite. Alpha-amylase is an extracellular enzyme. The precipitate collected from 70% (NH4)2SO4 salting-out was dissolved in required amount of 0.1M phosphate buffer (pH 6.8). The dialysis was conducted to get rid of the ions in the protein. After dialysis in the buffer for 24hrs, the sample was subjected to gel filtration. The fraction number 38th had shown highest α-amylase activity (3793±12U/ml) with protein concentration (4.8mg/ml). The fold purification obtained (3.9) when the sample was subjected to sephadex G-100 gel filtration. The specific activity increased from 202.6U/mg protein to 790.21U/mg protein. In ascending paper chromatography and thin layer chromatography the Rf value of test (maltose formed by the action of α-amylase on starch) was similar to standard maltose. Native polyacrylamide gel electrophoresis (PAGE) was conducted to determine the homogeneity of α-amylase at pH 8.3 in 12% slab gel. Specific staining was conducted to confirm the protein band as α-amylase.
Authors and Affiliations
K. Suribabu*1
Cloud Storage Security And Providing Integrity Proof
Cloud computing has been envisioned as the next-generation architecture and solution to the rising storage costs of IT Enterprises. Cloud faithfully stores the data and return back to the owner whenever needed. Bu...
SOFTWARE PERFORMANCE PREDICTION USING RANDOM FOREST BASED REGRESSION ANALYSIS
The evaluation of various software quality metrics like performance, reliability, and response time are done usingquantitative techniques and it is essential for component based software applications. In this paper...
Design and Implementation of Intrusion Detection System (Ids) Sensor Deployment
Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intru...
Polymeric Fluid Flow Obeying ECTN Model in an Inclined Circular Tube with Permeable Wall
In this paper, the flow of a polymeric fluid obeying ECTN (Energetically Cross linked Transient Network)model in an inclined circular tube with permeable wall is analyzed. In this study, the rates of segment crea...
AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD
Cloud computing is an umbrella term used to refer to Internet based development and services. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown...